[1] |
RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978,4(11): 169-180.
|
[2] |
GENTRY C , . Fully homomorphic encryption using ideal lattices[C]// 41st Annual ACM Symposium on Theory of Computing (STOC 2009),Bethesda,USA. 2009: 169-178.
|
[3] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[J]. Journal of the ACM, 2013,60(6): 43-65.
|
[4] |
BRAKERSKI Z , VAIKUNTANATHAN V . Efficient fully homomorphic encryption from (standard) LWE[J]. SIAM Journal on Computing, 2014,43(2): 831-871.
|
[5] |
TREPACHEVA A , BABENKO L . Known plaintexts attack on polynomial based homomorphic encryption[C]// 7th International Conference on Security of Information and Networks (SIN 2014),Glasgow,UK. 2014.
|
[6] |
YASUDA M , SHIMOYAMA T , KOGURE J ,et al. Secure statistical analysis using RLWE-based homomorphic encryption[C]// 20th Australasian Conference on Information Security and Privacy (ACISP 2015),QUT,Australia. 2015: 471-487.
|
[7] |
汤殿华, 祝世雄, 王林 ,等. 基于 RLWE 的全同态加密方案[J]. 通信学报, 2014,35(1): 173-182.
|
|
TANG D H , ZHU S X , WANG L ,et al. Fully homomorphic encryption scheme from RLWE[J]. Journal on Communications, 2014,35(1): 173-182.
|
[8] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// CRYPTO '84,Santa Barbara,California,USA. 1984: 47-53.
|
[9] |
光焱, 祝跃飞, 费金龙 ,等. 利用容错学习问题构造基于身份的全同态加密体制[J]. 通信学报, 2014,35(2): 111-117.
|
|
GUANG Y , ZHU Y F , FEI J L ,et al. Identity-based fully homomorphic encryption from learning with error problem[J]. Journal on Communications, 2014,35(2): 111-117.
|
[10] |
GENTRY C , SAHAI A , WATERS B . Homomorphic encryption from learning with errors:conceptually-simpler,asymptotically-faster,attribute-based[C]// 33rd Annual International Cryptology Conference (CRYPTO 2013), Santa Barbara,CA,USA, 2013: 75-92.
|
[11] |
HOFFSTEIN J , PIPHER J , SILVERMAN J H . NTRU:a ring-based public key cryptosystem[C]// ANTS III,Portland,Oregon,USA. 1998: 267-288.
|
[12] |
DUCAS L , DURMUS A , LEPOINT T ,et al. Lattice signatures and bimodal Gaussians[C]// 33rd Annual International Cryptology Conference (CRYPTO 2013),Santa Barbara,CA,USA. 2013: 40-56.
|
[13] |
PEIKERT C , . Lattice cryptography for the internet[C]// 6th International Conference on Post-Quantum Cryptography (PQCrypto 2014).Waterloo,ON,Canada. 2014: 197-219.
|
[14] |
LóPEZ-ALT A , TROMER E , VAIKUNTANATHAN V . On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption[C]// 44th Annual ACM Symposium on Theory of Computing (STOC 2012). Portland,USA, 2012: 1219-1234.
|
[15] |
DUCAS L , LYUBASHEVSKY V , PREST T . Efficient identity-based encryption over NTRU lattices[C]// 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt 2014),Kaohsiung,Taiwan (R.O.C.). 2014: 22-41.
|
[16] |
ALBRECHT M R , FAUGERE J C , FITZPATRICK R ,et al. Lazy modulus switching for the BKW algorithm on LWE[C]// 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2014). Buenos Aires,Argentina, 2014: 429-445.
|
[17] |
KIRCHNER P , FOUQUE P A . An improved BKW algorithm for LWE with applications to cryptography and lattices[C]// 35th Annual International Cryptology Conference (CRYPTO 2015). Santa Barbara,CA,USA, 2015: 43-62.
|
[18] |
LYUBASHEVSKY V , PREST T . Quadratic time,linear space algorithms for gram-schmidt orthogonalization and gaussian sampling in structured lattices[C]// 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt 2015). Sofia,Bulgaria, 2015: 789-815.
|
[19] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . A toolkit for ring-LWE cryptography[C]// 32rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Euro Crypt2013). Athens,Greece, 2013: 35-54.
|
[20] |
REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM (JACM), 2009,56(6): 34-43.
|
[21] |
MICCIANCIO D , REGEV O . Worst-case to average-case reductions based on gaussian measures[J]. SIAM Journal on Computing, 2007,37(1): 267-302.
|
[22] |
DUCAS L , NGUYEN P Q . Faster Gaussian lattice sampling using lazy floating-point arithmetic[C]// 18th Annual International Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt 2012). Beijing,China, 2012: 415-432.
|
[23] |
GAMA N , NGUYEN P Q . Predicting lattice reduction[C]// 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt 2008). Istanbul,Turkey, 2008: 31-51.
|
[24] |
MICCIANCIO D . Lattice-based cryptography[M]. US: Encyclopedia of Cryptography and SecurityPress, 2011.
|