共 17 条
- [1] [Anonymous], 2013, 2013340 IACR CRYPT E
- [2] [Anonymous], 2014, Report 2014/816
- [3] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
- [4] Brakerski Z., 2011, ELECT C COMPUT COMPL, VTR11, P277
- [5] Chillotti Ilaria, 2016, Paper 2016/870
- [6] Dowlin N, 2016, PR MACH LEARN RES, V48
- [7] Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
- [8] Computing Arbitrary Functions of Encrypted Data [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (03) : 97 - 105
- [9] Gentry Craig, 2009, PhD thesis
- [10] PROBABILISTIC ENCRYPTION [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) : 270 - 299