共 22 条
[2]
Birkhoff G., 1967, COLL PUB, V1967, P3
[3]
Boneh D, 2011, LECT NOTES COMPUT SC, V6571, P1, DOI 10.1007/978-3-642-19379-8_1
[4]
Cao Zhang-hua, 2010, Journal of Computer Applications, V30, P499, DOI 10.3724/SP.J.1087.2010.00499
[5]
de Castro LN, 2003, SOFT COMPUT, V7, P526, DOI [10.1007/S00500-002-0237-Z, 10.1007/S00500-002-0237-z]
[6]
Gentry C., 2001, ADV CRYPTOLOGY ASIAC, V2248, P1
[7]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112