共 18 条
[1]
Rivest R.L., Adleman L., Dertouzos M.L., On data banks and privacy homomorphisms, Foundations of Secure Computation, 4, 11, pp. 169-180, (1978)
[2]
Gentry C., Fully homomorphic encryption using ideal lattices, STOC, 9, pp. 169-178, (2009)
[3]
Duk M.V., Gentry C., Halevi S., Et al., Fully homomorphic encryption over the integers, The 29th Annual Eurocrypt Conference, pp. 24-43, (2010)
[4]
Smart N.P., Vercauteren F., Fully homomorp-hic encryption with relatively small key and cipher-ext sizes, The 13th International Conference on Practive and Theory in Public Key Cryptography(PKC2010), pp. 420-443, (2010)
[5]
Gentry C., Halevi S., Implementing gentry's fully homomorphic encryption scheme, EUROCRYP-T, Lecture Notes in Computer Science, pp. 129-148, (2011)
[6]
Brakerski Z., Vaikuntanathan V., Efficient fully homomorphic encryption from (standard) LWE, SIAM Journal on Computing, 43, 2, pp. 831-871, (2014)
[7]
Brakerski Z., Vaikuntanathan V., Fully homomorphic encryption from ring-LWE and security for key dependent messages, Advances in Cryptology CRYPTO 2011, pp. 505-524, (2011)
[8]
Regev O., On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM (JACM), 56, 6, (2009)
[9]
Lyubashevsky V., Peikert C., Regev O., On ideal lattices and learning with errors over rings, Journal of the ACM (JACM), 60, 6, (2013)
[10]
Brakerski Z., Gentry C., Vaikuntanathan V., (Leveled) fully homomorphic encryption without bootstrapping, The 3rd Innovations in Theoretical Computer Science Conference, pp. 309-325, (2012)