Loading [MathJax]/jax/output/SVG/jax.js
Research article

Tsunami damage estimation in Esmeraldas, Ecuador using fragility functions

  • The current study investigated the probable impact from a tsunami to a populated area located along the northwest ecuadorian coast, specifically in the key oil-industrial city of esmeraldas. a numerical tsunami simulation was performed considering the seismological and tectonic aspects of the area. The damage probability was calculated using fragility functions (ffs). Briefly, 16 cases of source models with slightly different fault parameters were tested, where one was selected as the worst scenario of tsunami inundation. This scenario was a hypothetic earthquake case (mw 8.7) located in front of esmeraldas city, approximately 100 km offshore along the ecuador—colombia trench, with three shallow fault segments (top depth of 10 km), a strike aligned with the trench axis, a middle dip angle of 28°, assuming large slips of 5 to 15 m, and a rake angle of 90°. The results from the numerical simulation were comparable to a similar study previously conducted and with those of historically documented data. The tsunami damage estimation using FFs resulted in estimated damages of 50% and 44% in exposed buildings and population, respectively. Results also showed that the most impacted areas were located next to the coastal shoreline and river. tourism, oil exports, and port activities, in general, would be affected in this scenario; thus, compromising important industries that support the national budget. Results from this study would assist in designing or improving tsunami risk reduction strategies, disaster management, use of coastal zones, and planning better policies.

    Citation: Teresa Vera San Martín, Leonardo Gutierrez, Mario Palacios, Erick Mas, Adriano Bruno, Shunichi Koshimura. Tsunami damage estimation in Esmeraldas, Ecuador using fragility functions[J]. AIMS Geosciences, 2021, 7(4): 669-694. doi: 10.3934/geosci.2021040

    Related Papers:

    [1] Shuangnian Hu, Rongquan Feng . The number of solutions of cubic diagonal equations over finite fields. AIMS Mathematics, 2023, 8(3): 6375-6388. doi: 10.3934/math.2023322
    [2] Wenxu Ge, Weiping Li, Tianze Wang . A remark for Gauss sums of order 3 and some applications for cubic congruence equations. AIMS Mathematics, 2022, 7(6): 10671-10680. doi: 10.3934/math.2022595
    [3] Junyong Zhao, Yang Zhao, Yujun Niu . On the number of solutions of two-variable diagonal quartic equations over finite fields. AIMS Mathematics, 2020, 5(4): 2979-2991. doi: 10.3934/math.2020192
    [4] Shuangnian Hu, Rongquan Feng . On the number of solutions of two-variable diagonal sextic equations over finite fields. AIMS Mathematics, 2022, 7(6): 10554-10563. doi: 10.3934/math.2022588
    [5] Yanbo Song . The recurrence formula for the number of solutions of a equation in finite field. AIMS Mathematics, 2021, 6(2): 1954-1964. doi: 10.3934/math.2021119
    [6] Junyong Zhao, Shaofang Hong, Chaoxi Zhu . The number of rational points of certain quartic diagonal hypersurfaces over finite fields. AIMS Mathematics, 2020, 5(3): 2710-2731. doi: 10.3934/math.2020175
    [7] Xiaoxue Li, Wenpeng Zhang . A note on the hybrid power mean involving the cubic Gauss sums and Kloosterman sums. AIMS Mathematics, 2022, 7(9): 16102-16111. doi: 10.3934/math.2022881
    [8] Shuangnian Hu, Yanyan Li, Rongquan Feng . Counting rational points of quartic diagonal hypersurfaces over finite fields. AIMS Mathematics, 2024, 9(1): 2167-2180. doi: 10.3934/math.2024108
    [9] Xiaodie Luo, Kaimin Cheng . Counting solutions to a system of quadratic form equations over finite fields. AIMS Mathematics, 2025, 10(6): 13741-13754. doi: 10.3934/math.2025619
    [10] Hu Jiayuan, Chen Zhuoyu . On distribution properties of cubic residues. AIMS Mathematics, 2020, 5(6): 6051-6060. doi: 10.3934/math.2020388
  • The current study investigated the probable impact from a tsunami to a populated area located along the northwest ecuadorian coast, specifically in the key oil-industrial city of esmeraldas. a numerical tsunami simulation was performed considering the seismological and tectonic aspects of the area. The damage probability was calculated using fragility functions (ffs). Briefly, 16 cases of source models with slightly different fault parameters were tested, where one was selected as the worst scenario of tsunami inundation. This scenario was a hypothetic earthquake case (mw 8.7) located in front of esmeraldas city, approximately 100 km offshore along the ecuador—colombia trench, with three shallow fault segments (top depth of 10 km), a strike aligned with the trench axis, a middle dip angle of 28°, assuming large slips of 5 to 15 m, and a rake angle of 90°. The results from the numerical simulation were comparable to a similar study previously conducted and with those of historically documented data. The tsunami damage estimation using FFs resulted in estimated damages of 50% and 44% in exposed buildings and population, respectively. Results also showed that the most impacted areas were located next to the coastal shoreline and river. tourism, oil exports, and port activities, in general, would be affected in this scenario; thus, compromising important industries that support the national budget. Results from this study would assist in designing or improving tsunami risk reduction strategies, disaster management, use of coastal zones, and planning better policies.



    Protecting the privacy of electronic data is a major challenge for today's security researchers. A 2013 study by the Cloud Security Alliance revealed a worrying increase in the number of incidents in which cloud data was leaked as a result of negligence, malware, or insider attacks [39]. The problem is that the users lose control over potentially privacy sensitive data. Encrypting data before sending it to the cloud is a simple way of guaranteeing confidentiality. However, if one uses traditional encryption, it also becomes impossible for the cloud operators to carry out any kind of processing of that data, as they would have to decrypt it first. Solving this problem is an active area of research. A number of approaches have been studied, relying on different techniques to address the problem of cloud security without compromising the functionality. Here we focus on solutions that are purely based on homomorphic encryption (HE) for privacy preservation.

    Homomorphic encryption schemes allow computations on the encrypted data. The result of those computations remains in encrypted form, and can thus only be recovered by the owner of the decryption key. Hence, homomorphic encryption offers privacy for both the client's and the server's data. For these reasons HE has shown great success in a variety of domains and applications, from the financial/business sector to the healthcare sector, the government sector, and even to neural networks [47]. The concept was imagined in the late seventies, but the first realization did not come until three decades later. HE schemes can be grouped into different categories, based on what operations they support and limitations they put on the circuit. Partially homomorphic encryption (PHE) schemes only support either addition or multiplication. Somewhat homomorphic encryption (SHE) supports both multiplication and addition on encrypted data. It cannot support arbitrarily deep circuits, making it unsuitable for some applications. Fully homomorphic encryption (FHE) schemes support both addition, multiplication, and circuits of arbitrary depth.

    Research in the area exploded after 2009 when Craig Gentry presented the first FHE scheme. In HE schemes, for security reasons, the encryption adds noise to the data and the decryption process is the removal of that noise. Performing operations on ciphertexts increases the noise and too much noise prevents correct decryption. It is possible to circumvent this by using the bootstrapping technique [25]. Bootstrapping reduces the accumulated noise so that further computation can be done. This process can be repeated as many times as needed to evaluate any given circuit. However, bootstrapping is computationally expensive which is why in practice many solutions do not use it. These days, both the public and private sectors are embracing this new security paradigm and are actively working at making HE more practical and easier to use.

    Let P denote a plaintext space and let F be a family of functions defined on Pn={(m1,,mn)miP} that can be viewed as Boolean circuits C. In most cases P={0,1} is identifiable with the ring Z2={[0]2,[1]2}.

    An encryption scheme E is F-homomorphic (or an F-evaluation scheme) if it is given by the following four probabilistic algorithms in polynomial time:

    E=(KeyGen,Enc,Dec,Eval)

    where

    KeyGen is the key generator; it takes as inputs a security parameter λ and an optional parameter α, representing for instance the number of homomorphic operations allowed, and outputs the secret key sk, the public key pk, and the (public) evaluation key evk, needed to compute the homomorphic operations on the ciphertext. Writing A for the auxiliary space and Ks,Kp, and Ke for the spaces of the secret, public, and evaluation keys, respectively, we obtain

    KeyGen:N×AKs×Kp×Ke
    KeyGen(λ,α)=(sk,pk,evk).

    In this paper we will usually denote the security parameter by λ. In other works, sometimes the security parameter is denoted by 1λ to keep track of its length.

    Enc is the encryption algorithm; it takes as inputs the public key pk and the message m and returns the ciphertext c as an element of the ciphertexts space X,

    Enc:Kp×PX
    Enc(pk,m)=c.

    Eval is the evaluation algorithm; it takes as inputs the evaluation key evk, a function fF, and a string (c1,,cn) of either ciphertexts or previous evaluated texts and returns as output a ciphertext cf. Writing Y for the space of the outputs of Eval, with Z the union of X and Y and with Z the space of n-strings in Z for a generic n, we get

    Eval:Ke×F×ZY
    Eval(evk,f,(c1,,cn))=cf.

    Dec is the decryption algorithm; it takes as inputs the secret key sk and a ciphertext c (or an output of the evaluation algorithm) and outputs the plaintext m,

    Dec:Ks×ZP
    Dec(sk,c)=m.

    Given a family F of functions, an F-homomorphic scheme E is called

    correct with respect to decrypting if for any plaintext mP, we have

    Dec(sk,Enc(pk,m))=m.

    correct with respect to evaluation if for any function fF, we have

    Pr[(Dec(sk,Eval(evk,f,(c1,,cn)))=f(Dec(sk,c1),,Dec(sk,cn))]=1ϵ(λ),

    for a negligible function ϵ *.

    *A function ϵ:NR is negligible if for any positive integer c, there exists an integer Nc such that for every x>Nc, one gets |ϵ(x)|<xc.

    ● a somewhat homomorphic encryption scheme (SHE) if it is correct with respect to both decrypting and evaluation.

    compact if there exists a polynomial p such that for every function fF, every triplet of keys (sk,pk,evk), and every ciphertext ciX, the output of the evaluation algorithm Eval(evk,f,(c1,,cn)) consists of at most p(λ) bits, independent from the complexity of the function f (that is, from the length of the corresponding Boolean circuit C). In other words, the length of the ciphertext does not grow too much when involved in homomorphic operations and the length of the final output depends on the length of the security parameter only.

    ● a leveled homomorphic encryption scheme (LHE) if it is a compact SHE scheme in which the length of the output of Eval does not depend on the auxiliary parameter, usually denoted in this context by L, that specifies the maximum number of consequent products allowed.

    ● a fully homomorphic encryption scheme (FHE) if it is a compact SHE scheme and F is the set of all functions (efficiently computable).

    Figure 1.  Types of homomorphic schemes.

    We remark that in a scheme that is correct with respect to evaluation, the cipheretexts

    Eval(evk,f,(c1,,cn)) and Enc(pk,f(Dec(sk,c1),,Dec(sk,cn)))

    correspond to the same plaintext, but arise from distinct constructions (for instance, they could have different levels of noise).

    In practice, the functions considered often correspond to sums (denoted by fs or +) and products (denoted by fp or ×) defined on a specific algebraic structure and the fact that the scheme is correct with respect to evaluation makes sure that, given two ciphertexts c1 and c2, we get

    Dec(sk,cfs)=Dec(sk,c1)+Dec(sk,c2)

    and

    Dec(sk,cfp)=Dec(sk,c1)×Dec(sk,c2).

    The origin of homomorphic encryption goes back to 1978 when, in [48], Rivest, Adleman and Dertouzos introduced the concept of privacy homomorphism and showed some examples of homomorphic schemes, one of which was RSA. Among other things, they posed the following question: For what algebraic systems does a useful privacy homomorphism exist? Later, various examples of homomorphic schemes based on a unique operation followed, such as the one by ElGamal [21] and Paillier [43]. In 2005, Boneh, Goh and Nissim (BGN) [7] described the first SHE scheme based on two operations: an arbitrary number of sums and a unique product, possibly followed by an arbitrary number of sums.

    Craig Gentry was the first to describe a plausible construction of an FHE scheme in [25], marking a turning point in the theory. His strategy consisted of three steps: the construction of an SHE scheme based on evaluation of low-degree polynomials, the use of the technique of squashing to the encryption procedure in order to express it as a low-degree polynomial (supported by the scheme), and finally the application of the method of bootstrapping to obtain an FHE scheme. Gentry's SHE scheme is also the first to be built on ideal lattices: the secret key represents a good basis for the lattice, meaning that its vectors are pairwise orthogonal, while the public key is given by a bad basis of the same lattice, made by skew vectors. Indeed, the security of Gentry's scheme is based on the fact that the problem of finding an orthogonal basis of a lattice is hard. In order to make the scheme bootstrappable, Gentry suggested to reduce the length of the decrypting polynomial adding to the public key a large set of vectors, requiring for the secret key to be the sum of a very sparse subset of such a set (the security of the scheme is therefore based on the sparse subset sum problem (SSSP)).

    The first implementation of Gentry's scheme was proposed in 2010 by Smart and Vercauteren (SV) in [51]. In that work, the authors used principal ideals with a prime determinant and expressed the secret key as a unique integer. However, given the complexity of the key generation (in order to obtain an ideal with a determinant that is prime, many candidates are required) such a scheme does not support parameters big enough to apply bootstrapping (it is not possible to generate keys with ideal lattices of dimension larger than 2048); it is therefore an SHE scheme that cannot be made into an FHE scheme.

    Later, Gentry and Halevi (GH) [26] adopted the same approach of Smart and Vercauteren, working on the same ring R=Z[x]/xN+1, for a positive integer N=2n, but without requiring for the lattice to have a determinant that is a prime number. Moreover, they described a faster algorithm to generate the secret key (invoking Fourier's discrete transform and its inverse to compute the inverse of the polynomial that generates the principal ideal lattice in the case of a general integer N and an easier recursive procedure when N=2n, as in the actual scheme described) and simplified the squashing, obtaining a decrypting polynomial of degree at most 15. In particular, the (GH) scheme is bootstrappable for every dimension of the lattice involved, even if its security is for low dimensions.

    Figure 2.  SHE schemes defined on lattices.

    The strength of the SHE schemes based on lattices lies on their theoretical feasibility and on the efficiency of the encrypting and decrypting algorithms obtained using the techniques of batching and squashing: the first allows one to cipher multiple messages in a unique ciphertext and the latter decreases the decrypting complexity. On the other hand, the fact that such schemes are constructed on complex mathematical structures induces high computational costs and requires a large amount of memory space, making it hard to implement them efficiently. Moreover, in [19], Cramer et al. highlighted the vulnerability of such schemes if attacked, for instance, by a quantum algorithm in polynomial time.

    In 2010, van Dijk, Gentry, Halevi and Vaikuntanathan introduced in [52] a new family of SHE schemes working on the ring of integers Z and basing the security on the SSSP and the approximate greatest common divisor problem (AGCD). The (DGHV) scheme is easier to treat with respect to Gentry's scheme (G) [25] since the operations involved are sums and products of integers in modular arithmetic. In [52], the authors applied Gentry's approach to show how to use the techniques of squashing and bootstrapping to build FHE schemes. The (DGHV) scheme is notably valued for its elegance and simplicity, but its high computational complexity and long bit-length of the public key make it less efficient in practical uses. Moreover, such a scheme is vulnerable to chosen-ciphertext attacks and noise flood attacks.

    In what follows we give a detailed description of Gentry's scheme and of Smart and Vercauteren's scheme.

    Given a basis B={b1,,bn} of Rn, the corresponding lattice of dimension n is defined as

    L={ni=1zibiziZ}

    and the parallelepiped associated to B is

    P(B)={ni=1xibixi[12,12)}.

    If uRn is a vector, the expression

    umodB

    denotes the unique vector uP(B) such that uuL.

    Let f(x)Z[x] be a monic and irreducible polynomial of degree n (whose definition depends on the security parameter λ) and consider the ring of integer polynomials modulo f:

    R=Z[x]/f(x).

    Every ideal of R is a lattice, and we will refer to such a structure as the ideal lattice. Note also that R can be viewed as a subset of Zn, identifying any polynomial of R with the vector of their coefficients. Suppose that if B is a basis of the ideal lattice I of R, then for every xR (corresponding to the vector x), the vector xmodB is unique and can be computed efficiently.

    The plaintext space is P={0,1}, which can be embedded in R (and so in Zn) setting m=(0,,0) if m=0 and m=(0,,0,1) if m=1. Let J be an ideal lattice of R (again seen as a subset of Zn).

    ● The keys are given by

    KeyGen:NMatn×n(Z)×Matn×n(Z)×Matn×n(Z)
    KeyGen(λ)=(sk=Bsk,pk=Bpk,evk=pk)

    where Bsk and Bpk are bases for J, described as matrices, and the secret key is good (formed by pairwise orthogonal vectors) while the pubblic key is bad.

    ● Given the message m{0,1} and the corresponding vector mZn, the encryption algorithm is

    Enc:Matn×n(Z)×RP(Bpk)
    Enc(pk,m)=(2r+m)modBpk,

    where rZn is a random vector representing the noise. In other words, Enc(pk,m) is the unique vector of the parallelepiped P(Bpk) such that

    (2r+m)Enc(pk,m)J

    and we can compute it as

    Enc(pk,m)=(2r+m)(2r+m)B1pkBpk=[(2r+m)B1pk]Bpk.

    ● The decryption algorithm is

    Dec:Matn×n(Z)×P(Bpk)Z2
    Dec(sk,c)=[cmodBsk]2.

    That is, we consider the congruence class modulo 2 of the unique vector c of the parallelepiped P(Bsk) such that ccJ, which can be computed as

    c=ccB1skBsk=[cB1sk]Bsk.

    F is the family of sums (denoted by fs) and products (denoted by fp) in the ring R (so they are sums and products among real coefficients polynomials modulo f(x)). The algorithm Eval outputs sums and products modulo evk=Bpk. If c1 and c2 are two ciphertexts, seen as elements of R, then

    Eval:Matn×n(Z)×R×RR
    Eval(evk,fs,(c1,c2))=(c1+c2)modBpk
    Eval(evk,fp,(c1,c2))=(c1c2)modBpk.

    With the notations (c1+c2) and (c1c2) we mean that we first compute the sum or the product of the polynomials c1 and c2 in R and then we express the result as a vector of coefficients in Zn.

    We remark that the scheme described by Gentry in [25] also allows for a larger plaintext space. More precisely, fixing an ideal lattice I of R and a basis BI, one can consider as a plaintext space any subset P of RmodBI. In this case, the output of the decryption algorithm will not be modulo 2 but modulo BI:

    Dec(sk,c)=[cmodBsk]modBI.

    The scheme described above corresponds to taking I=2, that is, the set of polynomials of degree at most n1 with only even coefficients.

    Gentry's scheme is correct with respect to decryption, as long as the noise vectors and the vectors of the public basis are small enough. Indeed, if m{0,1}n is a plaintext (viewed as an element of R), the corresponding ciphertext c can be expressed as j+(2r+m), for a vector jJ. Hence

    cB1sk=(j+(2r+m))B1sk=(jB1sk)+(2r+m)B1sk.

    Since jJ, the vector jB1sk has integer coefficients and we deduce that

    [cB1sk]=[(2r+m)B1sk].

    If the vectors forming the basis Bpk and the vector 2r+m are small enough (for instance, if all coefficients of (2r+m)B1sk have an absolute value less than 1/2), then

    [(2r+m)B1sk]=(2r+m)B1sk

    and so

    Dec(sk,c)=[(2r+m)B1skBsk]2=[(2r+m)]2=m.

    The scheme is also correct with respect to the evaluation of sums. Let c1=j1+(2r+m1) and c2=j2+(2r+m2) be the ciphertexts associated with the plaintexts m1 and m2.

    Then

    Dec(sk,Eval(evk,fs,(c1,c2)))=Dec(sk,c1+c2modBsk)=[(c1+c2modBsk)modBsk]2=[c1+c2modBsk]2=[[(c1+c2)B1sk]Bsk]2=[[c1B1sk+c2B1sk]Bsk]2=[[c1B1sk]Bsk]2+[[c2B1sk]Bsk]2=Dec(sk,c1)+Dec(sk,c2).

    Similarly, it is possible to verify that the scheme is correct with respect to the evaluation of the product. This proves that Gentry's scheme is an SHE scheme.

    Let λ be the fixed security parameter, and let us consider

    ● an integer N=N(λ)=2nN, that defines the polynomial f(x)=xN+1 and the ring

    R=Z[x]/f(x)=Z[x]/xN+1;

    ● an integer t=t(λ)N.

    Choose a polynomial v(x)=N1i=0vixiR such that v0 is odd, and every coefficient has an absolute value less than 2t (and at least one coefficient is an integer of bit-length t). Given the matrix

    V:=(v0v1vN1vN1v0vN2v1v2v0)MN(Z),

    its determinant d=det(V) is a prime number.

    Let us now consider the ideal lattice J=(v) generated by the polynomial v(x) and the unique number r[d/2,d/2) that is a zero of both f(x) and v(x) modulo d (considering the reductions modulo d in the interval [d/2,d/2)). The uniqueness of r is proved in [50, Lemma 1] using algebraic number theory techniques. Note that the ideal J is completely determined by d and r.

    Finally, set ri:=rimodd and consider the normal Hermitian form of J:

    B=HNF(J)=(d000r1100r2010rN1001)MN×N(Z). (1)

    Note that the matrix V represents a good basis for J, while B represents a bad basis. The plaintext space is P=Z2. In this context, we can now present the algorithms of the scheme:

    ● The keys are given by

    KeyGen:NR×(N×R)×N
    KeyGen(λ)=(sk=w(x),pk=(d,r),evk=d),

    where w(x) is such that v(x)w(x)=dmodf(x), so w(x) is an inverse of v(x) modulo f(x). The public key can also be defined as a matrix: pk=B.

    ● Given the plaintext mZ2, the encryption algorithm is

    Enc:(N×R)×Z2Zd
    Enc(pk,m)=[2u(r)+m]d

    where u=N1i=0uixiZ[x] is a random polynomial with integer coefficients representing the noise and u(r) is the evaluation of the polynomial u in r. If we write u for the vector of the coefficients of u and m for the vector corresponding to m (as in Gentry's scheme), encrypting m is equivalent to computing the first entry of the vector 2u+mmodB.

    ● The decryption algorithm is

    Dec:R×ZdZ2
    Dec(sk,c)=[ccw0d]2,

    where w0 is the first coefficient of the polynomial w(x).

    ● The evaluation algorithm Eval outputs sums and products in the ring R, computed modulo evk=d.

    By definition, the ciphertext c corresponding to the plaintext m is the first entry of the unique vector c of the parallelepiped P(B) such that (2u+m)cJ. Using the polynomial notation and recalling that J is generated by v(x), we get

    2u(r)+mc=q(r)v0

    for a polynomial q(x)R. Dividing by v(x), using the fact that v(x)1=w(x)d1, and looking at the first coefficient of the polynomials, we obtain

    cw0d=q(r)(2u(r)+m)w0d.

    If the error is small enough, that is, such that (2u(r)+m)w0d=0, then

    cw0d=q(r)

    and the decryption procedure is correct (as v0 is odd by assumption):

    Dec(w0,Eval(pk,m))=[2u(r)+mq(r)v0cw0d]2=[2u(r)+mq(r)(v01)]2=m.

    It is not hard to prove that the evaluation is correct as well, and so this is an SHE scheme.

    In 2011 Brakerski and Vaikuntanathan started a new reaserch direction introducing the first FHE schemes based on the learning with errors problem (LWE) [12] (extended version in [14]) and on the ring learning with errors problem (RLWE) [13]. Such schemes have a great relevance in modern cryptography. Indeed, they offer an optimal combination of security, functionality, and applicability. For n1 and q2, the (search-)LWE problem asks to recover s=(s1,,sn)Znq given any desired m=poly(n) independent linear equations such as the following,

    {a11s1++a1nsn+e1=b1(modq)a21s1++a2nsn+e2=b2(modq)am1s1++amnsn+em=bm(modq)

    where the matrix A=(ajk)Zm×nq is chosen uniformly, and each ei is usually taken from a Gaussian distribution χ and rounded to the nearest integer (modulo q). The LWE problem is believed to be computationally hard, because of the Regev's reduction from the worst-case hardness of some lattice problems, such as GapSVP (the decision version of the Shortest Vector Problem, which consists in finding a non-zero vector vL that minimizes the Euclidean norm), to the search-LWE problem [46]. This reduction works for any modulus q2n/α, with 0<α<1, but it requires the use of quantum computation. In [45], Peikert proved that LWE is classically at least as hard as worst-case GapSVP on lattices for large modulus q2n/2. Since then, the LWE problem has become one of the most attractive and promising topics for post-quantum cryptography.

    In Brakerski and Vaikuntanathan's scheme (BV), given a plaintext mZ2 and a secret key sZnq, the idea is to generate a ciphertext

    c=(a,a,s+2e+m)Znq×Zq,

    where aZnq is a vector chosen uniformly at random and eZq is an error chosen with distribution χ(Zq). In this way the message m is masked twice: by the scalar product a,s and by the noise 2e. These masks can be removed independently in the process of decrypting: the first is subtracted and the noise noise 2e is canceled considering the congruence class modulo 2 (as long as the error e is small enough, that is, such that 2e+mmodq=2e+m). In [12] the authors also show how to make the scheme bootstrappable (and so into an FHE scheme), introducing the techniques of relinearization and modulus switching, in substitution of Gentry's squashing technique. The relinearization is used to control the growth of noise, in particular after operations of multiplication, while the modulus switching consists on considering an integer p smaller than q and, given a ciphertext c modulo q, to multiply it by p/q and to approximate the result to the nearest integer, obtaining a new ciphertext c modulo p.

    The scheme (BV-RLWE) described in [13] is a new version of (BV) whose security is based on the polynomial LWE problem, that is proved to be equivalent to the RLWE problem. The main difference is in the fact that plaintexts, keys and ciphertexts are built not working in Zq, for an odd integer q, but in the ring Rq=Zq[x]/f(x), for a prime number q and a suitable polynomial f(x)Z[x].

    In 2012 Brakerski, Gentry and Vaikuntanathan (BGV) [10] (technical report in [9], extended version in [11]) proposed a procedure to build an LHE scheme (without invoking the bootstrapping) and a new bootstrapping technique used to obtain an FHE scheme. These innovations represented an important change in the field because they allow for the scheme to be truly applicable in various practical situations. The scheme (BGV) exists in two versions, based on the LWE and RLWE problems, respectively. The scheme (BGV-RLWE) is the most efficient and it was implemented in the open-source HElib library by IBM [35]. We point out that such a scheme has been improved in [27] (with optimized bootstrapping in [28]) and the library architecture is based on a variant of (BGV) proposed by Gentry, Halevi and Smart [29].

    Again in 2012, Brakerski (B) [6] presented a variant of (BGV) based on the Scale-invariant technique, in substitution of modulus switching. In particular, in the encryption algorithm the plaintext m is "scaled" multiplying it by the number q2 (and the decrypting algorithm is modified accordingly). In the scheme (B) the technique of key wwitching also appears, consisting of two algorithms: SwitchKeyGenq,χ(s,t) that, starting form a secret key s and a "target" key t, outputs a matrix Ps:t and SwitchKeyq(Ps:t,cs) that, using the matrix Ps:t, allows it to express a ciphertext cs, encrypted using the key s, as a ciphertext ct, encrypted using the key (1,t). As a consequence of this innovation, the dimension of the errors arising from the operations of multiplication grows linearly. Also, a classic reduction is used to show that its security is based on the hardness of (SVP) (in previous works the reductions were of quantum type only).

    Fan and Vercauteren (FV) [24] implemented and optimized the RLWE version of Brakerski's scheme (B), introducing two ways of relinearizing the output of the product evaluation, in order to obtain a polynomial of degree 1 instead of 2. The scheme (FV) is one of the three schemes implemented in Microsoft's Simple Encrypted Arithmetic Library (SEAL) [49].

    Figure 3.  First schemes based on the LWE and RLWE problems.

    The next two subsections are devoted to the (BGV) scheme and to the (FV) scheme, respectively.

    We first present a base scheme (without evaluation) on which both the LWE and RLWE versions of the (BGV) scheme are built, as described in [10]. Choosing a security parameter λ, we consider a ring R depending on λ, setting for instance R=Z in the LWE version and R=Z[x]/xd+1 in the RLWE version, for an integer d=d(λ)=2kN. For every positive integer tN, set

    Rt=R/tR.

    Hence, if R=Z we get Rt=Zt and if R=Z[x]/xd+1 we obtain Rt=Zt[x]/xd+1. The plaintext space is P=R2.

    Let us consider the following further parameters:

    ● an integer μ=μ(λ)N;

    ● an odd modulus q=q(λ)N of μ-bit;

    ● two dimensions n=n(λ),N=N(λ)N;

    ● a distribution χ=χ(λ) on R (as small as possible).

    The algorithms of the base scheme are defined as follows.

    ● The keys are given by

    KeyGen:NRn+1q×MatN×(n+1)(Rq)
    KeyGen(λ)=(sk=s=(1,s[1],,s[n]),pk=A),

    where sχ(Rnq) is a secret vector and, given a vector eχ(RNq) representing the error and a matrix AMatN×n(Rq), the matrix AMatN×(n+1)(Rq) is defined as the matrix that has the vector b=As+2eRNq as the first column, followed by the n columns of the matrix A. Note that As=2e.

    ● Given a plaintext mR2, set m=(m,0,,0)Rn+1q. The corresponding ciphertext is given by

    Enc:MatN×(n+1)(Rq)×Rn+1qRn+1q
    Enc(pk=A,m)=[m+ATr]q,

    where rRN2 is a vector representing the error.

    We point out that in [10] the authors remark that the scheme (BGV-RLWE) is more efficient if one puts N=1 (so that the matrix A can be thought of as a vector of length n+1) and introducing in the output of Enc a further small error eRn+1q:

    Enc(pk=A,m)=[m+2e+ATr]q.

    ● The decryption algorithm is

    Dec:Rn+1q×Rn+1qR2
    Dec(sk=s,c)=[[c,s]q]2.

    Note that the base scheme is correct with respect to decryption if the error e is small:

    Dec(sk=s,Enc(pk=A,m))=[[m+ATr,s]q]2=[[m,s+ATr,s]q]2=[[m+As,r]q]2=[[m+2e,r]q]2=m.

    In [10, Section 3.4] the authors describe an LHE scheme, in which for every level l, with 0<lL, distinct keys and distinct moduli are defined. Instead of using bootstrapping to make it into an FHE scheme, they define an algorithm, called Refresh, that allows one to modify the level of the ciphertext, passing to keys and modulus of the previous level and decreasing the noise. The Refresh algorithm uses an extra evaluation key evk (that can be viewed as an encryption of the secret key) and is formed by

    SwitchKey: Allows it to pass from a ciphertext c, encrypted using the secret key sl defined at the level l, to a ciphertext c1, encrypted using the secret key sl1 defined at the level l1, preserving the initial modulus ql;

    Scale: Starting from the ciphertext c1, it outputs a ciphertext c2 encrypted using the same secret key sl1 but with respect to the modulus ql1.

    The family F of homomorphic operations is formed by sums fs and products fp in the ring Rn+1q. Given two ciphertexts c1 and c2, encrypted using the same secret key (at the same level l), the evaluation of the sum is

    Eval(evk,fs,(c1,c2))=Refresh(evk,[c1+c2]ql).

    As for the product fp, we consider the following linear equation depending on the ciphertext c:

    Lc(x)=c,x.

    Note that decryption c with the secret key s corresponds to computing [[Lc(s)]q]2. Given two ciphertexts c1 and c2, we can now consider a quadratic equation, that can be also viewed as a linear equation on tensor products:

    Llongc1,c2(xx)=Lc1(x)Lc2(x).

    We can now define the evaluation algorithm for the product:

    Eval(evk,fs,(c1,c2))=Refresh(evk,Llongc1,c2(xx)).

    We refer to [10] for the proof of the correctness of the evaluation.

    In [24] Fan and Vercauteren applied the relinearization technique to decrease the length of products of ciphertexts and proposed two SHE schemes, which we are going to describe, referring to them as version 1 and version 2 of (FV).

    Given a security parameter λ, let us consider the polynomial rings

    R=Z[x]/xd+1 and Rt=Zt[x]/xd+1,

    for a positive integer d=2k and a positive integer t=t(λ). The plaintext space is P=Rt.

    Moreover, we fix the following parameters:

    ● an odd integer q=q(λ)N (the modulus);

    ● an integer TN (used for relinearization in version 1);

    ● an integer pN (used for relinearization through modulo switching in version 2);

    ● two error distributions χ=χ(λ) and χ=χ(λ) defined on R. The distribution χ can be identify with the discrete Gaussian distribution. However, χ is used in version 2 and must differ from χ, otherwise the security of the scheme would be considerably weakened.

    We remark that if xRt and yR2=Z2[x]/xd+1, then both x and y can be viewed as elements of R and as such can be multiplied. With the symbol we denote the operation of multiplication in R.

    The algorithms of (FV) are the following:

    ● the keys are generated by

    KeyGen:NR2×(Rq×Rq)×Ke
    KeyGen(λ)=(sk=s,pk=([(as+e)]q,a),evk)

    where sR2 and aRq are chosen uniformly at random, eχ(R) is an error and with evk1 and evk2 we denote the evaluation keys in versions 1 and 2 of the (FV) scheme, respectively.

    In version 1, let =logT(q), and for every i0,, set aiRq (chosen uniformly at random), eiχ(R) and

    evk=evk1=([(ais+ei)+Tis2]q,ai){i[0,]}

    In version 2, the relinearization consists of passing from computations modulo q to computations modulo pq:

    evk=evk2=([(as+e)+ps2]pq,a),

    for aRpq and eχ(R).

    ● Given a plaintext mRt and the public key

    pk=(pk[1],pk[2])=([(as+e)]q,a),

    we get

    Enc:(Rq×Rq)×Rt(Rq×Rq)
    Enc(pk,m)=([pk[1]u+e1+qtm]q,[pk[2]u+e2]q),

    for some uR2 and errors e1,e2χ(R).

    ● Given a ciphertext c=(c[1],c[2]), the decryption algorithm is

    Dec:R2×(Rq×Rq)Rt
    Dec(sk,c)=[t[c[1]+c[2]s]qq]t.

    ● The family F consists of sums fs and products fp in R. Let c1=(c1[1],c1[2]) and c2=(c2[1],c2[2]) be two ciphertexts. The evaluation algorithm is defined among the sets

    Eval:Ke×F×(Rq×Rq)(Rq×Rq)

    and, applied to the sum, is the natural evaluation:

    Eval(evk,fs,(c1,c2))=[c1+c2]q.

    As for the product, the relinearization technique is invoked and the output is different in the two versions of (FV). First, let us compute

    x=[t(c1[1]c2[1])q]q,
    y=[t(c1[1]c2[2]+c1[2]c2[1])q]q,

    and

    z=[t(c1[2]c2[2])q]q.

    In version 1, we express z as: z=li=0ziTi, for ziRT, and we get

    Eval(evk1,fp,(c1,c2))=([x+li=0evk1[i][1]zi]q,[y+li=0evk1[i][2]zi]q).

    Instead, in version 2 the evaluation of the product is:

    Eval(evk2,fp,(c1,c2))=([x+[zevk2[1]p]q]q,[y+[zevk2[2]p]q]q).

    Both versions of (FV) are correct with respect to both decryption and evaluation, and so they are SHE schemes. Indeed, if the errors are small enough (that is, such that 0 is the nearest integer to the product tq[eu+e1+e2s]), it is easy to see that the decryption procedure is correct:

    Dec(sk,Enc(pk,m))==[t[[pk[1]u+e1+qtm]q+[pk[2]u+e2]qs]qq]t=[t[[[(as+e)]qu+e1+qtm]q+[au+e2]qs]qq]t=[tq[[[eu+e1+qtm]q+e2s]q]t=[tq[eu+e1+qtm+e2s]]t=m+[tq[eu+e1+e2s]]t=m.

    The proof of the correctness of the evaluation of sums and products can be read in detail in [24, Section 4]. Moreover, in [24, Sections 5 e 6] the authors show how to produce an LHE scheme and an FHE scheme.

    In 2013 Gentry, Sahai and Waters (GSW) [30] suggested a different approach for the computation of homomorphic operations, starting a research direction known as the third generation of FHE schemes. The (GSW) scheme does not invoke the modulus switching technique, but the approximate eigenvector method reduces the error arising from products to a small polynomial factor. On the other hand, the (GSW) scheme requires high communication costs (the ciphertext is larger with respect to the corresponding plaintext) and high computational complexity. To remedy such problems, various optimizations of such a scheme were later proposed. Alperin-Sheriff and Peikert (AP) [1] suggested a new bootstrapping algorithm considering the process of decrypting as an arithmetic function instead of a Boolean circuit, a procedure later improved by Hiromasa et al. [33] and extended to rings by Ducas and Micciancio (FHEW: Fastest Homomorphic Encryption in the West) [20]. We remark that the (FHEW) scheme is the first one to execute bootstrapping in a fraction of a second; in the literature, this innovative bootstrapping technique is known as AP/FHEW bootstrapping.

    The (FHEW) scheme has been the starting point used by Chillotti et al. in 2020 [15] to define the (TFHE) scheme based on the torus that uses a new bootstrapping technique (known as GINX) first described by Gama et al. in [31]; see also [22] for an algebraic version of (TFHE) and [23] for an application. In a recent work, Lee and Micciancio et al. [41] described a bootstrapping technique combining the best aspects of AP/FHEW and GINX/TFHE.

    In 2017, Cheon, A. Kim, M. Kim, and Song (CKKS) [17] started the so-called fourth generation of FHE schemes, suggesting a new method to construct an LHE scheme and including an open-source library (known as HEANN [34]) that implements it. The (CKKS) scheme was extended to an FHE scheme in [16] and constitutes the starting point for many further optimizations. For instance, in [37] Kim, Papadimitriou and Polyakov proposed a technique to decrease the propagation of errors, rescaling the ciphertexts before applying the homomorphic operations, and presented two RNS (residue number system) variants of (CKKS), both implemented in the PALISADE library [44].

    One of the novelties of the fourth generation schemes is that they use approximate arithmetic, which makes the algorithms faster. In 2021, Li and Micciancio [40] proved that the (CKKS) scheme and its variants are vulnerable to attacks by adversaries knowing the encryption function.

    Figure 4.  Third and fourth generation schemes based on the LWE and RLWE problems.

    We conclude this survey on fully homomorphic encryption briefly describing recent results aimed at improving efficiency and security of FHE schemes.

    In 2020, Boura, Gama, Georgieva and Jetchev introduced the scheme known as CHIMERA [8]: a hybrid scheme combining (TFHE), (FV) and (CKKS). In CHIMERA, the plaintext space is defined in such a way that the plaintext spaces of (TFHE), (FV) and (CKKS) could embed in it. Using bootstrapping, the authors describe a procedure that allows it to pass from ciphertexts encrypted using (TFHE) or (CKKS) to ciphertexts encrypted according to (FV), and vice versa. CHIMERA turned out to be very useful in many practical scenarios, in which the various natures of the operations involved caused the application of only one of the schemes (TFHE), (FV) or (CKKS) inadequate. Moreover, CHIMERA contributes the project of standardization of FHE schemes.

    In 2021, Cho et al. [18] proposed a scheme, called (RtF) (real-to-finite-field), that combines (CKKS) and (FV) and exploits a new stream cipher, known as HERA, based on modular arithmetic. They showed how such strategies allow one to encrypt large real numbers without incurring in an excessive growth of the ciphertext's dimension or of the memory space needed to compute homomorphic operations. In 2022, Ha et al. [32] followed the approach of Cho et al. [18] and introduced a new stream cipher, called RUBATO, that further decreases the computational complexity of (RtF).

    In 2023, Bae, Cheon, Kim, Park, and Stehlé [3] proposed two solutions to the ring packaging problem, that is, the problem of conversion of a scheme based on the LWE problem to one based on the RLWE problem. On one hand, they presented a strategy that speeds up the existing ring packaging technique through bootstrapping and ring switching; on the other, they introduced a completely new method, called HERMES, showing how to apply it to transform a symmetric cryptosystem based on LWE into a variant of (CKKS). In particular, the authors proved that HERMES is more efficient than both HERA and RUBATO.

    In 2021, Kim, Polyakov and Zucca [38] described new schemes inspired by the (BGV) and (FV) schemes. The variant of (FV) contains various optimizations, including decreasing of noise growth and the definition of a novel algorithm for the evaluation of multiplication that reduces the computational complexity of the original one. As for (BGV), the authors describe a "pratical" variant that is more efficient than (FV) in certain real scenarios. Both variants have been implemented in the PALISADE library.

    In 2023, Okada, Player and Pohmann [42] proposed a strategy to improve the evaluation of polynomials in the bootstrapping of (FV), using Galois automorphisms. Moreover, they showed how some of the bootstrapping techniques of (FHEW) and (TFHE) can be applied to (FV).

    One of the strategies invoked to strengthen the security of public-key cryptosystems consists in dividing the secret key into n parts, delivered to n distinct clients, so that only their cooperation (or the cooperation of a certain number of them) could lead to decryption. Such a technique is known as threshold public key encryption and the expression t-out-of-n means that at least t+1 of the n clients must cooperate to decipher the message. In [2] the authors showed that threshold public key encryption can be applied to FHE schemes, that are in this case denoted by ThFHE. In 2023, Boudgoust and Scholl [5] introduced a new ThFHE scheme of type t-out-of-n based on the LWE problem that involves the use of a modulus given by a polynomial function of the security parameter (while previous works required a superpolynomial modulus, with consequent increase of computational costs).

    We remark that the innovative bootstrapping procedure elaborated by Lee et al. in [41] is particularly efficient when applied to ThFHE schemes.

    One of the major difficulties in applying FHE schemes to real scenarios lies in the determination of the best parameters to use in order to preserve security requiring low computational costs. In 2023, Bergerat et al. [4] formalized the problem of the parameters' choice as an optimization problem and suggested to encrypt a plaintext into more than one ciphertexts using novel algorithms. Their work focused on the (TFHE) scheme, but the strategy illustrated can also be applied to other FHE schemes.

    Certain FHE schemes, such as (FV) and (CKKS), support rotation operations, that is, permutations of the ciphertexts components (e.g., the entries of the vector corresponding to the ciphertext). These operations are needed if the scheme contains homomorphic operations involving distinct components of the ciphertext and they require an evaluation key, called the rotation key. In 2023, Lee, Lee, Kim, and No [36] introduced a hierarchic system of rotation keys, which allows it to generate such keys starting from the public key and a small number of rotation keys, significantly decreasing the communication costs between client and server.

    Fully homomorphic encryption represents an important step forward in cryptography, offering unprecedented levels of privacy and data security. Its ability to perform computations on encrypted data without decryption has the potential to transform how we handle and use sensitive information in various domains, including healthcare, finance and national security. As FHE schemes continue to mature and practical applications emerge, this revolutionary technology is poised to play a critical role in defining the future of data security and privacy.

    Gentry's work represented a breakthrough in the field of cryptography by presenting the first plausible scheme that supports arbitrary computations on encrypted data. This achievement has long been considered the Holy Grail of cryptography, due to its usefulness in multiple industries, from cloud computing to data mining. The original scheme was based on ideals and lacked efficient implementation. However, its central idea, i.e., the use of an SHE scheme capable of evaluating its own decryption circuit, was subsequently applied to other cryptographic systems, including LWE and AGCD, providing more efficient schemes. With the introduction of other important techniques, such as module and key switching, these systems have become increasingly efficient over time. The key advances in FHE cryptography can be summarized as follows:

    ● Development of FHE schemes based on cryptographic systems other than ideal ones: this has led to more efficient and practical schemes.

    ● Development of techniques to improve the efficiency of FHE schemes: such techniques include module and key switching and packing.

    ● Development of efficient implementations of FHE schemes: these implementations have made FHE schemes more accessible and usable.

    Overall, advances in FHE have led to more efficient FHE schemes, which can be used in a wide range of applications, including:

    ● Healthcare data analytics: FHE can be used to perform complex analytics on sensitive healthcare data, such as medical images or genetic data, without compromising patient privacy.

    ● Financial data analysis: FHE can be used to perform complex financial analysis, such as risk assessment or price forecasting, without revealing sensitive customer or transaction information.

    ● Government data analysis: FHE can be used to perform analysis of sensitive government data, such as intelligence data or national security data, without compromising national security.

    ● Cloud computing: FHE can be used to allow cloud providers to process sensitive data securely, without having to decrypt it.

    ● Data mining: FHE can be used to perform data analysis on large datasets, without having to reveal sensitive information contained in the data.

    Advances in the field have made FHE schemes a promising technology with significant potential to transform the way sensitive data is handled. As FHE schemes continue to improve, they are expected to have a significant impact on a wide range of scenarios.

    Valentina Grazian: Investigation, Writing – original draft; Antonio Tortora and Maria Tota: Writing – review and editing.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors are members of the National Group for Algebraic and Geometric Structures, and their Applications. They would like to thank the referees for their useful comments, and Prof. Carlo Blundo for the inspiring conversations and meaningful suggestions that enabled them to improve this work.

    The authors declare no conflict of interest in this paper.



    [1] Gupta HK, Gahalaut VK (2013) Three Great Tsunamis: Lisbon(1755) Sumatra-Andaman (2004) and Japan(2011), Springer Briefs in Earth Science, Springer.
    [2] Levin B, Nosov M (2016) Physics of tsunamis, Springer. 399.
    [3] IOC, Tsunami Glossary, 2013, Unesco: Paris, 45.
    [4] Levin B, Nosov M (2009) Physics of Tsunamis, Springer. 327.
    [5] Bryan E (2014) Tsunami The Underrated Hazard, Springer-Praxis.
    [6] Geist EL (2002) Complex earthquake rupture and local tsunamis. J Geophys Res 107: 2086. doi: 10.1029/2000JB000139
    [7] Rooney A (2012) Tsunami! (NATURE'S FURY), Encyclopedia Britannica, Inc.
    [8] Tolkova E (2018) Tsunami Propagation In Tidal Rivers. Sringer Briefs in Earth Sciences, Springer, 123.
    [9] USGS, Search Earthquake Catalog, 2019. Available from: https://earthquake.usgs.gov/earthquakes/search/.
    [10] Otero LJ, Restrepo JC, Gonzalez M (2014) Tsunami hazard assessment in the southern Colombian Pacific basin and a proposal to regenerate a previous barrier island as protection. Nat Hazards Earth Sys Sci 14: 1155-1168. doi: 10.5194/nhess-14-1155-2014
    [11] Chlieh M, Mothes PA, Nocquet JM, et al. (2014) Distribution of discrete seismic asperities and aseismic slip along the Ecuadorian megathrust. Earth Planet Sci Lett 400: 292-301. doi: 10.1016/j.epsl.2014.05.027
    [12] Ioualalen M, Monfret T, Béthoux N, et al. (2014) Tsunami mapping in the Gulf of Guayaqui, Ecuador, due to local seismicity. Mar Geophys Res 35: 361-378. doi: 10.1007/s11001-014-9225-9
    [13] Ye L, Kanamori H, Avouac JP, et al. (2016) The 16 April 2016, M W 7.8 (M S 7.5) Ecuador earthquake: A quasi-repeat of the 1942 M S 7.5 earthquake and partial re-rupture of the 1906 M S 8.6 Colombia-Ecuador earthquake. Earth Planet Sci Lett 454: 248-258. doi: 10.1016/j.epsl.2016.09.006
    [14] Bethoux N, Segovia M, Alvarez V, et al. (2011) Seismological study of the central Ecuadorian margin: Evidence of upper plate deformation. J South Am Earth Sci 31: 139-152. doi: 10.1016/j.jsames.2010.08.001
    [15] Yi L, Xu CJ, Wen YM, et al. (2018) Rupture process of the 2016 Mw 7.8 Ecuador earthquake from joint inversion of InSAR data and teleseismic P waveforms. Tectonophysics 722: 163-174. doi: 10.1016/j.tecto.2017.10.028
    [16] Collot JY, Ribodetti A, Agudelo W, et al. (2011) The South Ecuador subduction channel: Evidence for a dynamic mega-shear zone from 2D fine-scale seismic reflection imaging and implications for material transfer. J Geophys Res Solid Earth 116: 1-20. doi: 10.1029/2011JB008429
    [17] Gutscher MA, Malavieille J, Lallemand S, et al. (1999) Tectonic segmentation of the North Andean margin: impact of the Carnegie Ridge collision. Earth Planet Scie Lett 168: 255-270. doi: 10.1016/S0012-821X(99)00060-6
    [18] Kanamori H, McNally K (1982) Variable Rupture Mode of the Subduction Zone along the Ecuador-Colombia Coast. Bull Seismol Soc Am 72: 1241-1253.
    [19] Arreaga P, Ortiz M, Farreras S (2006) Mapping the possible tsunami hazard as the first step towards a tsunami resistant community in Esmeraldas, Ecuador, Tsunamis Case Studies and Recent Developments, Springer: Netherlands, 203-215.
    [20] Chunga K, Toulkeridis T, Vear-Grunauer X, et al. (2017) Review of Earthquakes and Tsunami Records and Characterization of Capable Faults on the Northwestern Coast Of Ecuador. J Tsunami Soc Int 36: 100-127.
    [21] Contreras M (2014) Riesgo de tsunami en Ecuador. Ingenius 12: 68-75.
    [22] Espinoza J (1992) Terremotos tsunamigénicos en el Ecuador. Acta Oceanográfica del Pacífico 7: 21-28.
    [23] Ioualalen M, Ratzov G, Collot J, et al. (2011) The tsunami signature on a submerged promontory: the case study of the Atacames Promontory, Ecuador. Geophys J Int 184: 680-688. doi: 10.1111/j.1365-246X.2010.04878.x
    [24] Pararas C (2012) Potential of Tsunami Generation along the Colombia/Ecuador Subduction Margin and the Dolores-Guayaquil Mega-Thrust. J Tsunami Soc Int 31: 209-230.
    [25] De Risi R, Goda K (2016) Probabilistic Earthquake-Tsunami Multi-Hazard Analysis: Application to the Tohoku Region, Japan. Front Built Environ 2: 19. doi: 10.3389/fbuil.2016.00025
    [26] Koshimura S, Namegaya Y, Yanagisawa H (2009) Tsunami Fragility—A New Measure to Identify Tsunami Damage. J Disaster Res 4: 479-488. doi: 10.20965/jdr.2009.p0479
    [27] Macabuag J (2017) Tsunami Damage Prediction for Buildings: Development of Methods for Empirical and Analytical Fragility Function Derivation, Department of Civil, Environmental and Geomatic Engineering, University College London.
    [28] Mas E, Koshimura S, Suppasri A, et al. (2012) Developing Tsunami fragility curves using remote sensing and survey data of the 2010 Chilean Tsunami in Dichato. Nat Hazards Earth Sys Sci 8: 2689-2697. doi: 10.5194/nhess-12-2689-2012
    [29] Vera T (2015) Tsunami Damage Estimation in Esmeraldas, Ecuador Using Tsunami Fragility Functions, Tsukuba, Japan, 59.
    [30] Charvet I, Suppasri A, Imamura F (2014) Empirical fragility analysis of building damage caused by the 2011 Great East Japan tsunami in Ishinomaki city using ordinal regression, and influence of key geographical features. Stoch Environ Res Risk Assess 28: 1853-1867. doi: 10.1007/s00477-014-0850-2
    [31] Reese S, Bradley B, Bind J, et al. (2011) Empirical building fragilities from observed damage in the 2009 South Pacific tsunami. Earth Sci Rev 107: 156-173. doi: 10.1016/j.earscirev.2011.01.009
    [32] Alam MS, Barbosa AR, Scott MH, et al. (2018) Development of Physics-Based Tsunami Fragility Functions Considering Structural Member Failures. J Struct Eng 144: 04017221. doi: 10.1061/(ASCE)ST.1943-541X.0001953
    [33] Attary N, van de Lindt JW, Unnikrishnan VU, et al. (2017) Methodology for Development of Physics-Based Tsunami Fragilities. J Struct Eng 143: 12. doi: 10.1061/(ASCE)ST.1943-541X.0001715
    [34] Dias WPS, Yapa HD, Peiris LMN (2009) Tsunami vulnerability functions from field surveys and Monte Carlo simulation. Civ Eng Environ Syst 26: 181-194. doi: 10.1080/10286600802435918
    [35] Karafagka S, Fotopoulou S, Pitilakis K (2016) Tsunami fragility curves for seaport buildings and warehouses. Nat Hazards Infrastruct, 28-30.
    [36] Kircher CA, Bouabid J (2014) New Building Damage and Loss Functions for Tsunami. Tenth U S Nat Conf Earthquake Eng.
    [37] Nanayakkara KIU, Dias WPS (2015) Fragility curves for structures under tsunami loading. Nat Hazards 80: 471-486. doi: 10.1007/s11069-015-1978-1
    [38] Park S, van de Lindt JW, Cox D, et al. (2012) Successive Earthquake-Tsunami Analysis to Develop Collapse Fragilities. J Earthquake Eng 16: 851-863. doi: 10.1080/13632469.2012.685209
    [39] Petrone C, Rossetto T, Goda K (2017) Fragility assessment of a RC structure under tsunami actions via nonlinear static and dynamic analyses. Eng Struct 136: 36-53. doi: 10.1016/j.engstruct.2017.01.013
    [40] Medina S, Lizarazo-Marriaga J, Estrada M, et al. (2019) Tsunami analytical fragility curves for the Colombian Pacific Coast: A reinforced concrete building example. Eng Struct 196: 109309. doi: 10.1016/j.engstruct.2019.109309
    [41] Belliazzi S, Lignola GP, Di Ludovico M, et al. (2021) Preliminary tsunami analytical fragility functions proposal for Italian coastal residential masonry buildings. Structures 31: 68-79. doi: 10.1016/j.istruc.2021.01.059
    [42] Ferrotto MF, Cavaleri L (2021) Masonry structures: A proposal of analytical generation of fragility functions for tsunami impact—Application to the Mediterranean coasts. Eng Struct 242.
    [43] INEC, INEC presenta sus proyecciones poblacionales cantonales 2010-2020. 2010. Available from: https://www.ecuadorencifras.gob.ec/inec-presenta-sus-proyecciones-poblacionales-cantonales/.
    [44] Prezzi C, Silberleigt V (2015) Seismic hazards along Ecuador, Perú and northern Chile (South America). Nat Hazards 79: 1159-1175. doi: 10.1007/s11069-015-1900-x
    [45] Yoshimoto M, Kumagai H, Acero W, et al. (2017) Depth-dependent rupture mode along the Ecuador-Colombia subduction zone. Geophys Res Lett 44: 2203-2210. doi: 10.1002/2016GL071929
    [46] Social, Sistema de Indicadores Sociales del Ecuador. 2019. Available from: http://www.siise.gob.ec/siiseweb/.
    [47] Poulard S (2012) REDATAM +SP, CEPAL. Available from: https://www.cepal.org/es/temas/redatam/acerca-redatam.
    [48] Luque A, Edwards GAS, Lalande C (2012) The local governance of climate change: new tools to respond to old limitations in Esmeraldas, Ecuador. Local Environ 18: 738-751. doi: 10.1080/13549839.2012.716414
    [49] MINTUR, Boletín de Estadísticas-Turísticas 2012-2016. 2017. Ministerio de Turismo del Ecuador.
    [50] INEC, Presentacion Esmeraldas Censo económico 2011. 2011. Available from: https://anda.inec.gob.ec/anda/index.php/catalog/586/related_materials.
    [51] Valdivia G (2018) "Wagering Life" in the Petro-City: Embodied Ecologies of Oil Flow, Capitalism, and Justice in Esmeraldas, Ecuador. Ann Am Assoc Geogr 108: 549-557.
    [52] Bank EC (2018) Reporte de Sector Petrolero. Ⅱ trimestre de 2018, Publicaciones económicas, Ecuadorian Central Bank: Ecuador.
    [53] Bank EC (2017) Reporte de Sector Petrolero. IV trimestre de 2017, Publicaciones económicas, Ecuadorian Central Bank: Ecuador.
    [54] MINTUR (2018) Perfiles de Turismo Internacional 2017,152.
    [55] INEC (2010) CPV Interactivo para Investigadores y Académicos: Glosario de Términos Censales*, INEC, 15.
    [56] Dominey-Howes D, Papathoma M (2007) Validating a Tsunami Vulnerability Assessment Model (the PTVA Model) Using Field Data from the 2004 Indian Ocean Tsunami. Nat Hazards 40: 113-136. doi: 10.1007/s11069-006-0007-9
    [57] Turismo MD (2017) Boletín de Estadísticas Turisticas, 2012-2016. 179.
    [58] Kendrick E, Bevis M, Smalley Jr R, et al. (2003) The Nazca-South America Euler vector and its rate of change. J South Am Earth Sci 16: 125-131. doi: 10.1016/S0895-9811(03)00028-2
    [59] Gailler A, Charvis P, Flueh ER (2007) Segmentation of the Nazca and South American plates along the Ecuador subduction zone from wide angle seismic profiles. Earth Planet Sci Lett 260: 444-464. doi: 10.1016/j.epsl.2007.05.045
    [60] DeMets C, Gordon RG, Argus DF, et al. (1990) Current plate motions. Geophys J Int 101: 425-478. doi: 10.1111/j.1365-246X.1990.tb06579.x
    [61] Ruff LJ, Kanamori H (1980) Seismicity and the subduction process. Phys Earth Planet Inter 23: 240-252. doi: 10.1016/0031-9201(80)90117-X
    [62] Collot JY, Charvis P, Gutscher MA, et al. (2002) Exploring the Ecuador-Colombia Active Margin and Interplate Seismogenic Zone. EOS 23: 185-190. doi: 10.1029/2002EO000120
    [63] Proust JN, Martillo C, Michaud F, et al. (2016) Subduction of seafloor asperities revealed by a detailed stratigraphic analysis of the active margin shelf sediments of Central Ecuador. Mar Geol 380: 345-362. doi: 10.1016/j.margeo.2016.03.014
    [64] Collot JY, Michaud F, Alvarado A, et al. (2009) Visión general de la morfologia submarina del margen convergente de Ecuador-Sur de Colombia: Implicaciones sobre la transferencia de masa y la edad de la subducción de la Cordillera de Carnegie. 47-74.
    [65] Bilek SL (2010) Invited review paper: Seismicity along the South American subduction zone: Review of large earthquakes, tsunamis, and subduction zone complexity. Tectonophysics 495: 2-14. doi: 10.1016/j.tecto.2009.02.037
    [66] Parra H, Benito MB, Gaspar-Escribano JM (2016) Seismic hazard assessment in continental Ecuador Parra. Bull Earthquake Eng 14: 2129-2159. doi: 10.1007/s10518-016-9906-7
    [67] Swenson J, Beck S (1996) Historical 1942 Ecuador and 1942 Peru Subduction Earthquakes, and Earthquake cycles along Colombia-Ecuador and Peru Subduction segments. Pageoph 146: 35.
    [68] Arreaga P (2004) Análisis de riesgo por tsunamis en la ciudad de Esmeraldas, Escuela Superior Politécnica del Litoral: Guayaquil-Ecuador, 320.
    [69] Segovia M (2001) El sismo de Bahía del 4 de agosto de 1998: Caracterización del mecanismo de ruptura y análisis de la sismicidad en la zona costera. Titulo de Ingeniera Geologia tesis: Escuela Politecnica Nacional, Quito, Ecuador. Available from: https://bibdigital.epn.edu.ec/.
    [70] Nocquet JM, Jarrin P, Vallee M, et al. (2016) Supercycle at the Ecuadorian subduction zone revealed after the 2016 Pedernales earthquake. Nat Geosci 10: 145-149. doi: 10.1038/ngeo2864
    [71] Vaca S, Vallee M, Nocquet JM, et al. (2018) Recurrent slow slip events as a barrier to the northward rupture propagation of the 2016 Pedernales earthquake (Central Ecuador). Tectonophysics 724-725: 80-92. doi: 10.1016/j.tecto.2017.12.012
    [72] Contreras M (2013) Chronology of tsunamis in Ecuador from 1586 to 2012. Revista La Técnica 11: 50-59.
    [73] Papazachos BC, Scordilis ME, Panagiotopoulos DG, et al. (2001) Global Relations Between Seismic Fault Parameteres and Moment Magnitude of Earthquakes. Bull Geol Soc Greece 36: 1482-1489. doi: 10.12681/bgsg.16538
    [74] Jimenez C, Moggiano N, Mas E, et al. (2013) Seismic Source of 1746 Callao Earthquake from Tsunami Numerical Modeling. J Disaster Res 8: 266-273. doi: 10.20965/jdr.2013.p0266
    [75] Imamura F, Yalciner CA, Ozyurt G (1995) Tsunami Modelling Manual. IOC Int Train Course Tsunami Numer Modell, 58.
    [76] Okada Y (1985) Surface deformation due to shear and tensile faults in a half-space. Bull Seismol Soc Am 75: 1135-1154. doi: 10.1785/BSSA0750041135
    [77] Tanioka Y, Satake K (1996) Tsunami generation by horizontal displacement of ocean bottom. Geophys Res Lett 15: 861-864. doi: 10.1029/96GL00736
    [78] Arreaga P (2015) Tsunami Inundation Modeling and Hazard Mapping of the South Coast of Ecuador. National Graduate Institute for Policy Studies. Building Reserch Institute, 73.
    [79] Charvet I, Macabuag J, Rossetto T (2017) Estimating Tsunami-Induced Building Damage through Fragility Functions: Critical Review and Research Needs. Front Built Environ 3.
    [80] Suppasri A, Mas E, Charvet I, et al. (2013) Building damage characteristics based on surveyed data and fragility curves of the 2011 Great East Japan tsunami. Nat Hazards 66: 319-341. doi: 10.1007/s11069-012-0487-8
    [81] Koshimura S, Oie T, Yanagisawa H, et al. (2009) Developing Fragility Functions for Tsunami Damage Estimation Using Numerical Model and Post-Tsunami Data from Banda Aceh, Indonesia. Coastal Eng J 51: 243-273. doi: 10.1142/S0578563409002004
    [82] UNDRR. Terminology|PreventionWeb.net. 2020. Available from: https://digitallibrary.un.org/record/857333.
    [83] Shi P, Kasperson R (2015) World Atlas of Natural Disaster Risk, BNUP-Springer, 381.
    [84] Rehman, K, Cho YS (2016) Building Damage Assessment Using Scenario Based Tsunami Numerical Analysis and Fragility Curves. Water 8: 109. doi: 10.3390/w8030109
    [85] Suppasri A, Mas E, Koshimura S, et al. (2012) Developing Tsunami Fragility Curves from the Surveyed Data of the 2011 Great East Japan Tsunami in Sendai and Ishinomaki Plains. Coastal Eng J 54: 1250008.
    [86] SGR (2012) Tsunami Inundation Charts. Available from: http://www.gestionderiesgos.gob.ec/wp-content/uploads/downloads/2013/12/Muisne.pdf.
    [87] Cruz M, Acosta M, Vasquez N (2005) Riesgos por Tsunami en la Costa ecuatoriana, Nacional del Ecuador del Instituto Panamericano de Geografia e Historia, Organizacion de Estados Americanos, OEA. Publicaciones de geofísica.
    [88] INEC (2010) Censo de Población y Vivienda. Available from: https://www.ecuadorencifras.gob.ec/base-de-datos-censo-de-poblacion-y-vivienda-2010/.
    [89] Vera San Martín T, Rodriguez Rosado G, Arreaga Vargas P, et al. (2018) Population and building vulnerability assessment by possible worst-case tsunami scenarios in Salinas, Ecuador. Nat Hazards 93: 275-297. doi: 10.1007/s11069-018-3300-5
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3290) PDF downloads(89) Cited by(0)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog