共 17 条
- [1] Shor P., Algorithms for quantum computation:discrete logarithms and factoring, 35th Annual Symposium on the Foundations of Computer Science, pp. 124-134, (1994)
- [2] Rivest R L, Adleman L, Dertouzos M L., On data banks and privacy homomorphisms[J], Foundations of Secure Computation, pp. 169-179, (1978)
- [3] Gentry C., A fully homomorphic encryption scheme, pp. 1-34, (2009)
- [4] Gentry C., Computing arbitrary functions of encrypted data[J], Communications of the ACM, 53, 3, pp. 97-104, (2010)
- [5] Castelluccia C, Chan C F, Mykletun E, Et al., Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions on Sensor Networks, 5, 3, pp. 1-36, (2009)
- [6] Hessler A, Kakumaru T, Perrey H, Et al., Data obfuscation with network coding[J], Computer Communications, 35, 1, pp. 48-61, (2012)
- [7] Rohde P P, Fitzsimons J F, Gilchrist A., Quantum walks with encrypted data[J], Physical Review Letters, 109, 15, (2012)
- [8] Liang M., Quantum fully homomorphic encryption scheme based on universal quantum circuit, Quantum Information Processing, 14, 8, pp. 2749-2759, (2015)
- [9] Wang Y, She K, Luo Q, Et al., Symmetric weak ternary quantum homomorphic encryption schemes[J], Modern Physics Letters B, 30, (2016)
- [10] Ouyang Y K, Tan S H, Fitzsimons J F., Quantum homomorphic encryption from quantum codes, Physical Review A, 98, (2015)