共 19 条
- [1] [Anonymous], 1978, FDN SECURE COMPUT
- [2] Armknecht F., 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2011), P65, DOI 10.1109/Med-Hoc-Net.2011.5970495
- [3] Bosch Christoph, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P2694, DOI 10.1109/ICASSP.2014.6854089
- [4] Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
- [5] Efficient Fully Homomorphic Encryption from (Standard) LWE [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 97 - 106
- [6] Chung KM, 2010, LECT NOTES COMPUT SC, V6223, P483, DOI 10.1007/978-3-642-14623-7_26
- [7] Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
- [8] Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
- [9] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [10] Leveled Fully Homomorphic Signatures from Standard Lattices [J]. STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, : 469 - 477