共 47 条
[1]
PIR with compressed queries and amortized query processing
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:962-979
[3]
Barni M, 2009, LECT NOTES COMPUT SC, V5789, P424, DOI 10.1007/978-3-642-04444-1_26
[4]
Efficient Garbling from a Fixed-Key Blockcipher
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:478-492
[5]
Bellare Mihir, 2012, FDN GARBLED CIRCUITS, P784, DOI 10.1145/2382196.2382279
[6]
Bonte Charlotte, 2022, Report 2022/074
[7]
Machine Learning Classification over Encrypted Data
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[8]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[9]
Brickell J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P498
[10]
Chosen-Ciphertext Secure Fully Homomorphic Encryption
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II,
2017, 10175
:213-240