共 46 条
[2]
A novel searchable encryption scheme to reduce the access pattern leakage
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2022, 133
:338-350
[4]
Cryptanalysis of a homomorphic encryption scheme
[J].
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES,
2018, 10 (01)
:27-39
[5]
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[7]
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[8]
Dautrich JL, 2012, LECT NOTES COMPUT SC, V7371, P145, DOI 10.1007/978-3-642-31540-4_12
[10]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178