[1] |
REGEV O . On lattices, learning with errors, random linear codes, and cryptography[A]. Proceeding of the 37th ACM Symposium on Theory of Computing (STOC2005)[C]. Baltimore, MD, USA, 2005.84-93.
|
[2] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[A]. Proceeding of the 29th Annual Eurocrypt Conference[C]. Riviera, French, 2010.1-23.
|
[3] |
GENTRY C . Fully homomorphic encryption using ideal lattices[A]. Proceeding of the 40st ACM Symposium on Theory of Computing (STOC2009)[C]. Bethesda, Maryland, USA, 2009.169-178.
|
[4] |
DIJK M V , GENTRY C , HALEVI S et al. Fully homomorphic en-cryption over the integers[A]. Proceeding of the 29th Annual Eurocrypt Conference[C]. Riviera, French, 2010.24-43.
|
[5] |
SMART N P , VERCAUTEREN F . Fully homomorphic encryption with relatively small key and ciphertext sizes[A]. Proceeding of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC2010)[C]. Paris, France, 2010.420-443.
|
[6] |
GENTRY C , HALEVI S . Implementing gentry's fully homomorphic encryption scheme[A]. Proceeding the 30th Annual Eurocrypt Conference[C]. Tallinn, Estonia, 2011.129-148.
|
[7] |
STEHL′E D , STEINFELD R . Faster fully homomorphic encryption[A]. Proceeding of the 16th Annual Asiacrypt Conference[C]. Singapore, 2010.377-394.
|
[8] |
BRAKERSKI Z , VAIKUNTANATHAN V . Efficient fully homomorphic encryption from (standard) LWE[A]. Proceeding of IEEE 52nd Annual Symposium on Foundations of Computer Science(FOCS2011)[C]. Palm Springs, CA, USA, 2011.97-106.
|
[9] |
BRAKERSKI Z , GENTR C , VAIKUNTANATHAN V . Fully homomorphic encryption without bootstrapping[A]. Proceeding of Innovations in Theoretical Computer Science 2012[C]. Cambridge, MA, USA, 2012.309-305.
|
[10] |
GENTRY C , HALEVI S , SMART N P . Fully homomorphic encryption with polylog overhead[A]. Proceeding of the 31st Annual Eurocrypt Conference[C]. Canbridge, UK, 2012.465-482.
|
[11] |
GENTRY C , HALEVI S , SMART N P . Better bootstrapping in fully homomorphic encryption[A]. Proceeding of 15th International Conference on Practice and Theory in Public Key Cryptography[C]. Darmstadt, Germany, 2012.1-16.
|
[12] |
SHAMIR A . Identity-based cryptosystems and signature schemes[A]. Proceeding of the 8th Annual International Cryptology Conference[C]. Santa Barbara, California, USA, 1984.47-53.
|
[13] |
HU L , LIU Z L , SUN T et al. Survey of security on identity-based cryptography[A]. Journal of Computer Research and Development[C]. 2009,46(9): 1537-1548.
|
[14] |
PEIKERT C . Public-key cryptosystems from the worst-case shortest vector problem: extended abstract[A]. Proceeding of The 41st ACM Symposium on Theory of Computing (STOC2009)[C]. Bethesda, Maryland, USA, 2009.333-343.
|
[15] |
GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions[A]. Proceeding of the 40th ACM Symposium on Theory of Computing (STOC2008)[C]. Victoria, British Columbia, Canada, 2008.197-206.
|