共 55 条
[31]
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits (Extended Abstract)
[J].
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS),
2013,
:40-49
[32]
Garg S, 2013, LECT NOTES COMPUT SC, V7881, P1, DOI 10.1007/978-3-642-38348-9_1
[33]
Gentry C., 2018, 2018756 CRYPT EPRINT
[34]
Gentry C, 2015, LECT NOTES COMPUT SC, V9015, P498, DOI 10.1007/978-3-662-46497-7_20
[35]
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
[36]
Gentry C, 2010, LECT NOTES COMPUT SC, V6223, P155, DOI 10.1007/978-3-642-14623-7_9
[37]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[38]
Goldwasser S., 1982, 14 ACM STOC, P365
[39]
Goldwasser S, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P555
[40]
Hada S, 2000, LECT NOTES COMPUT SC, V1976, P443