First, it should be determined that a direct division operation is impossible. To obtain the quotient, a multi-step mechanism should be used.
In the integer division scheme, we define this operation as an equation in a multidimensional space H, in which the main goal is to determine the cipher quotient hyperedge ec from the dividend hyperedge ea and the divisor hyperedge eb.
To simplify, we can define division as an operator equation:
F(ec)=Γϵ(Ha)−Γϵ(Hb)⊙ec=0
It is worth clarifying what each element of this equation means:
Γϵ(Ha) and Γϵ(Hb), are incidence matrices with noise;
⊙, a linear transformation that inverts the influence of Γϵ(Hb) on ec, which is constructed using the Moore–Penrose inverse.
To solve the division problem, it is necessary to define the mechanics of range narrowing as:
ec∈R={e∈Rn∣0≤e≤1}
This is done to ensure that the quotient hyperedge ec remains within the ranges of R.
The next step is to initialize the cipher hyperedge and then define the inverse operator for the incidence matrix of the divisor.
Cipher hyperedges with cubic noise elements:
ea=Γϵ(Ha)+ϵa3,eb=Γϵ(Hb)+ϵb3
Where ϵa3 and ϵb3 are the cubic noise vectors added to Ha and Hb.
Also introduce regularization parameters to reduce the noise increase due to small singular values at the points:
Γϵ(Hb)+=(Γϵ(Hb)⊤Γϵ(Hb)+αI)−1Γϵ(Hb)⊤
In this case, Γϵ(Hb)⊤ is a transposition of Γϵ(Hb), I is the identity matrix of the corresponding size.
As a result, the division operation can be expressed as:
ec=Γϵ(Hb)+⊙Γϵ(Ha)
Let's substitute the operator ⊙:
ec=T⋅S⋅Γϵ(Hb)+⋅Γϵ(Ha)
We continue to expand:
ec=T⋅S⋅(Γϵ(Hb)⊤Γϵ(Hb)+αI)−1Γϵ(Hb)⊤Γϵ(Ha)
A further goal is to ensure that ec is within the acceptable range R while minimizing the residual noise. That is, we literally apply the projection operator PR to limit ec:
Hope it's clear why, but if for some reason it is not clear then you can read our article on noise management here (there we are talking about noise components after subtraction, but the logic is appropriate).
ϵres=Γϵ(Hb)⊙ec′−Γϵ(Ha)
Now the criteria for assessing compliance will be determined as:
∥ϵres∥2≤ϵtol
Where ϵtol is the noise tolerance threshold after which the ciphertexts will become insane.
Next step iteratively refine ec to minimize residual noise:
ec(0)=ec′
For each iteration k=0,1,2,…,K until ∥ϵres(k)∥2≤ϵtol:
In this case, βk is a scaling factor to control the influence of noise on iterations kn.
Additive type of error is:
r(k)=Γϵ(Ha)−Γϵ(Hb)⊙ec(k)
Cubic noise correction:
ϵc(k)3=ϵc(k)∘ϵc(k)∘ϵc(k)
The next step is to recalculate the residual noise after the update:
ϵres(k+1)=∥Γϵ(Hb)⊙ec(k+1)−Γϵ(Ha)∥2
We will also check the compliance with tolerances:
∥ϵres(k+1)∥2≤ϵtol
It is reasonable to ask how the stability of the structure is determined. Recall that the incidence matrix has good rows provided that:
ϵij≤r1−r21−r2lnr
And also the definition of the kernel norm:
ki(Γ(Υ))≤6+r37+O(r21)j=1∑rϵij2
As was said earlier, to guarantee the stability of the hypergraph structure in the presence of cubic noise, the inequality must be satisfied for good strings with large r (more details were described here):