共 14 条
[1]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[2]
Asharov Gilad., 2011, Report 2011/613, P613
[3]
Four Round Secure Computation Without Setup
[J].
THEORY OF CRYPTOGRAPHY, TCC 2017, PT I,
2017, 10677
:645-677
[4]
Multi-identity and Multi-key Leveled FHE from Learning with Errors
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:630-656
[5]
Two-Round Multiparty Secure Computation from Minimal Assumptions
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II,
2018, 10821
:468-499
[6]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[7]
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
[8]
Goldreich O., P 19 ANN ACM S THEOR
[9]
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS
[J].
INFORMATION SECURITY AND PRIVACY,
2018, 10946
:101-113
[10]
López-Alt A, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1219