共 24 条
[1]
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]
[Anonymous], 2012, ASIACCS
[3]
[Anonymous], 1974, The design and analysis of computer algorithms
[4]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]
Backes Michael, 2013, P 2013 ACM SIGSAC C, P863
[6]
Canetti R, 2014, LECT NOTES COMPUT SC, V8383, P113, DOI 10.1007/978-3-642-54631-0_7
[7]
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
[8]
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13
[9]
Dong C, 2013, P 2013 ACM SIGSAC C, P789
[10]
Efficiently Verifiable Computation on Encrypted Data
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:844-855