共 40 条
[1]
A Subfield Lattice Attack on Overstretched NTRU Assumptions Cryptanalysis of Some FHE and Graded Encoding Schemes
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:153-178
[2]
Alperin-Sheriff J, 2014, LECT NOTES COMPUT SC, V8616, P297, DOI 10.1007/978-3-662-44371-2_17
[3]
Multi-key Fully-Homomorphic Encryption in the Plain Model
[J].
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I,
2020, 12550
:28-57
[4]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[5]
Multiparty Reusable Non-interactive Secure Computation from LWE
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II,
2021, 12697
:724-753
[6]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[7]
Four Round Secure Computation Without Setup
[J].
THEORY OF CRYPTOGRAPHY, TCC 2017, PT I,
2017, 10677
:645-677
[8]
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:190-213
[9]
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[10]
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2012,
2012, 7417
:868-886