共 37 条
[1]
Armknecht F., Boyd C., Carr C., Gjosteen K., Jaschke A., Reuter C.A., Strand M., A guide to fully homomorphic encryption, Report 2015/1192, Cryptology, (2015)
[2]
Asharov G., Jain A., Lopez-Alt A., Tromer E., Vaikuntanathan V., Wichs D., Multiparty computation with low communication, computation and interaction via threshold fhe, Advances in Cryptology, EUROCRYPT 2012, Lecture Notes in Computer Science, pp. 483-501, (2012)
[3]
Atallah M.J., Li J., Secure outsourcing of sequence comparisons, Intl J. Inf. Security, 4, 4, pp. 277-287, (2005)
[4]
Atallah M.J., Pantazopoulos K., Rice J.R., Spafford E.E., Secure Outsourcing of Scientific Computations, Trends in Software Engineering, 54, pp. 215-272, (2002)
[5]
Benjamin D., Atallah M.J., Private and cheating-free outsourcing of algebraic computations, Proc. 6th Annu. Conf. PST, pp. 240-245, (2008)
[6]
Brakerski Z., Vaikuntanathan V., Efficient fully homomorphic encryption from (standard) LWE, Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS 11), pp. 97-106, (2011)
[7]
Chen X., Huang X., New algorithms for secure outsourcing of large-scale systems of linear equations, IEEE Transactions on Information Forensics and Security, January, 10, 1, pp. 69-78, (2015)
[8]
Coron J.-S., Lepoint T., Tibouchi M., Batch fully homomorphic encryption over the integers, EUROCRYPT 2013, Lecture Notes in Computer Science, 7881, pp. 315-335, (2013)
[9]
Coron J.S., Mandal A., Naccache D., Tibouchi M., Fully homomorphic encryption over the integers with shorter public keys, CRYPTO 2011, 6841, (2011)
[10]
Coron J.S., Naccache D., Tibouchi M., Public key compression and modulus switching for fully homomorphic encryption over the integers, Advances in Cryptology -EUROCRYPT 2012, Lecture Notes in Computer Science, 7237, pp. 446-464, (2012)