共 17 条
[1]
Shor P., Algorithms for quantum computation:discrete logarithms and factoring, 35th Annual Symposium on the Foundations of Computer Science, pp. 124-134, (1994)
[2]
Rivest R L, Adleman L, Dertouzos M L., On data banks and privacy homomorphisms[J], Foundations of Secure Computation, pp. 169-179, (1978)
[3]
Gentry C., A fully homomorphic encryption scheme, pp. 1-34, (2009)
[4]
Gentry C., Computing arbitrary functions of encrypted data[J], Communications of the ACM, 53, 3, pp. 97-104, (2010)
[5]
Castelluccia C, Chan C F, Mykletun E, Et al., Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions on Sensor Networks, 5, 3, pp. 1-36, (2009)
[6]
Hessler A, Kakumaru T, Perrey H, Et al., Data obfuscation with network coding[J], Computer Communications, 35, 1, pp. 48-61, (2012)
[7]
Rohde P P, Fitzsimons J F, Gilchrist A., Quantum walks with encrypted data[J], Physical Review Letters, 109, 15, (2012)
[8]
Liang M., Quantum fully homomorphic encryption scheme based on universal quantum circuit, Quantum Information Processing, 14, 8, pp. 2749-2759, (2015)
[9]
Wang Y, She K, Luo Q, Et al., Symmetric weak ternary quantum homomorphic encryption schemes[J], Modern Physics Letters B, 30, (2016)
[10]
Ouyang Y K, Tan S H, Fitzsimons J F., Quantum homomorphic encryption from quantum codes, Physical Review A, 98, (2015)