[1] |
ACAR A , AKSU H , ULUAGAC S ,et al. A survey on homomorphic encryption schemes:theory and implementation[J]. arXiv Preprint,arXiv:1704.03578, 2017.
|
[2] |
BRAKERSKI Z , GENTRY C , VAIKUNTANATHAN V . (Leveled) fully homomorphic encryption without bootstrapping[C]// Innovations in Theoretical Computer Science. New York:ACM Press, 2012: 309-325.
|
[3] |
BRAKERSKI Z , VAIKUNTANATHAN V . Fully homomorphic encryption from ring-LWE and security for key dependent messages[C]// Proceedings of the 31st Annual Conference on Advances in Cryptology. Berlin:Springer, 2011: 505-524.
|
[4] |
KIM J , KIM S , SEO J H . A new scale-invariant homomorphic encryption scheme[J]. Information Sciences, 2018,422: 177-187.
|
[5] |
蒋林智, 许春香, 王晓芳 ,等. 同态加密在基于密文计算模型中的应用[J]. 密码学报, 2017,4(6): 596-610.
|
|
JIANG L Z , XU C X , WANG X F ,et al. Application of homomorphic encryption for encrypted computing models[J]. Journal of Cryptologic Research, 2017,4(6): 596-610.
|
[6] |
YANG H M , HE W C , LI J ,et al. Efficient and secure kNN classification over encrypted data using vector homomorphic encryption[C]// IEEE International Conference on Communications. Piscataway:IEEE Press, 2018: 1-7.
|
[7] |
CHEON J H , JEONG J , KI D ,et al. Privacy protection K-means clustering with multiple data owners[J]. IACR Cryptology ePrint Archive, 2019(2019): 466.
|
[8] |
ANGELA J , ARMKNECHT F . Unsupervised machine learning on encrypted data[C]// International Conference on Selected Areas in Cryptography. Berlin:Springer, 2018: 453-478.
|
[9] |
HU S S , WANG Q , WANG J J ,et al. Securing SIFT:privacy protection outsourcing computation of feature extractions over encrypted image data[J]. IEEE Transactions on Image Processing, 2016,25(7): 3411-3425.
|
[10] |
CHEN G M , CHEN Q , ZHU X Y ,et al. Encrypted image feature extraction by privacy protection MFS[C]// 2018 International Conference on Digital Home. Piscataway:IEEE Press, 2018: 42-45.
|
[11] |
JIANG L Z , XU C X , WANG X F ,et al. Secure outsourcing SIFT:efficient and privacy protection image feature extraction in the encrypted domain[J]. IEEE Transactions on Dependable and Secure Computing, 2017,PP(99): 1.
|
[12] |
JIANG L Z , XU C X , WANG X F ,et al. Statistical learning based fully homomorphic encryption on encrypted data[J]. Soft Computing, 2017,21(24): 7473-7483.
|
[13] |
BACON D F , BENT G A , BERGAMASCHI F A ,et al. Performing efficient comparison operations on encrypted data:14952210[P].(2015-11-25)[2020-09-28].
|
[14] |
JIANG L Q , CAO Y , YUAN C S ,et al. An effective comparison protocol over encrypted data in cloud computing[J]. Journal of Information Security and Applications, 2019,48: 102367.
|
[15] |
贾春福, 王雅飞, 陈阳 ,等. 机器学习算法在同态加密数据集上的应用[J]. 清华大学学报(自然科学版), 2020,60(6): 456-463.
|
|
JIA C F , WANG Y F , CHEN Y ,et al. Machine learning algorithms on homomorphic encrypted data set[J]. Journal of Tsinghua University (Science and Technology), 2020,60(6): 456-463.
|
[16] |
HALEVI S , SHOUP V . Bootstrapping for HElib[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015: 641-670.
|
[17] |
KRYSZKIEWICZ M , SKONIECZNY L . Faster clustering with DBSCAN[C]// 2005 Intelligent Information Processing and Web Mining.[S.n.:s.l.], 2005: 605-614.
|
[18] |
CHEN Y W , TANG S Y , BOUGUILA N ,et al. A fast clustering algorithm based on pruning unnecessary distance computations in DBSCAN for high-dimensional data[C]// Pattern Recognition.[S.n.:s.l.], 2018: 375-387.
|
[19] |
CHEON J H , KIM D , KIM D ,et al. Numerical method for comparison on homomorphically encrypted numbers[C]// 25th International Conference on the Theory and Application of Cryptology and Information Security.[S.n.:s.l.], 2019: 415-445.
|
[20] |
谭作文, 张连福 . 机器学习隐私保护研究综述[J]. 软件学报, 2020,31(7): 2127-2156.
|
|
TAN Z W , ZHANG L F . Survey on privacy preserving techniques for machine learning[J]. Journal of Software, 2020,31(7): 2127-2156.
|