共 38 条
[1]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[3]
[Anonymous], 2009, Cryptology ePrint Archive, 2009/351
[4]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P431
[6]
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[7]
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[8]
A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience
[J].
IEEE SYSTEMS JOURNAL,
2020, 14 (01)
:633-644
[9]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[10]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178