共 23 条
[1]
Fully Homomorphic NIZK and NIWI Proofs
[J].
THEORY OF CRYPTOGRAPHY, TCC 2019, PT II,
2019, 11892
:356-385
[2]
Banfi F., 2023, Report 2023/249
[3]
Blaze M., 1994, 2nd ACM Conference on Computer and Communications Security, P59, DOI 10.1145/191177.191193
[4]
Blum M., 1985, P ADV CRYPTOLOGY, P289
[6]
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P90
[7]
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[8]
Frankel Y, 1995, LECT NOTES COMPUT SC, V963, P222
[9]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Impagliazzo R., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P12, DOI 10.1145/73007.73009