[1] |
RIVEST R L , ADLEMAN L , DERTOUZOS M L . On data banks and privacy homomorphisms[A]. DeMillo RA Foundations of Secure Computation[C]. NY,USA: Academic Press, 1978. 169-180.
|
[2] |
PAILLIER P . Public-key cryptosystems based on composite degree residuosity classes[A]. Proc of the Advances in Cryptology (EUROCRYPT'99)[C]. Prague,Czech Republic, 1999. 223-238.
|
[3] |
GOLDWASSER S , MICALI S . Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984,28(2): 270-299.
|
[4] |
RIVEST R L , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126.
|
[5] |
ELGAMAL T . A public-key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472.
|
[6] |
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts[A]. Second Theory of Cryptography Conference (TTC 2005)[C]. Cambridge,MA,USA, 2005. 325-341.
|
[7] |
GENTRY C . A Fully Homomorphic Encryption Scheme[D]. California,USA: Stanford University, 2009.
|
[8] |
GENTRY C . Fully homomorphic encryption using ideal lattices[A]. Proc of the 41st ACM Symposium on Theory of Computing(STOC' 09)[C]. Bethesda,Maryland,USA, 2009. 169-178.
|
[9] |
SMART P N , VERCAUTEREN F . Fully homomorphic encryption with relatively small key and ciphertext sizes[A]. Proc of the Public Key Cryptography (PKC 2010)[C]. Paris,France, 2010. 420-443.
|
[10] |
DIJK V M , GENTRY C , HALEVI S , et al. Fully homomorphic encryption over the integers[A]. Proc of the Advances in Cryptology (EUROCRYPT 2010)[C]. Riviera,France, 2010. 24-43.
|
[11] |
CORON J , MANDAL A , NACCACHE D , et al. Fully homomorphic encryption over the integers with shorter public keys[A]. Proc of the Advances in Cryptology (CRYPTO 2011)[C]. Santa Barbara,California,USA, 2011. 487-504.
|
[12] |
BRAKERSKI Z , VAIKUNTANATHAN V . Fully homomorphic encryption from ring-lwe and security for key dependent messages[A]. Proc of the Advances in Cryptology (CRYPTO 2011)[C]. Santa Barbara,California,USA, 2011. 505-524.
|
[13] |
GENTRY C , HALEVI S . Implementing Gentry's fully-homomorphic encryption scheme[A]. Proc of the Advances in Cryptology (EUROCRYPT 2011)[C]. Tallinn,Estonia, 2011. 129-148.
|
[14] |
BRAKERSKI Z , GENTRY C , VAIKUNTANATHAN V . Fully homomorphic encryption without bootstrapping[J]. Computer and Information Science, 2011,111(111): 1-12.
|
[15] |
GENTRY C , HALEVI S . Fully homomorphic encryption without squashing using depth-3 arithmetic circuits[A]. Proc of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science[C]. Palm Springs,CA,USA, 2011. 107-109.
|
[16] |
黄汝维, 桂小林, 余思 等. 云环境中支持隐私保护的可计算加密方法[J]. 计算机学报, 2011,34(12):2391-2402. HUANG R W , GUI X L , YU S , et al. Privacy-preserving computable encryption scheme of cloud computing[J]. Chinese Journal of Computers, 2011,34(12):2391-2402.
|
[17] |
冯登国 . 信息安全中的数学方法与技术[M]. 北京: 清华大学出版社, 2009. FENG D G . Mathematical Methods and Techniques for Information Security[M]. Beijing: Tsinghua University Press, 2009.
|
[18] |
HOFFSTEIN J , PIPHER J , SILVERMAN J H . NTRU:a ring-based public key cryptosystem[A]. Proceedings of the Third International Symposium on Algorithmic Number Theory[C]. Portland,Orgeon,USA, 1998. 267-288.
|
[19] |
MICCIANCIO D . Improving lattice based cryptosystems using the hermite normal form[A]. Proc of the Cryptography and Lattices Conference[C]. Rhode Island,USA, 2001. 126-145.
|
[20] |
DAVIS P J . Circulant Matrices[M]. New York: Jonh Wiley & Sons, 1979. 85-91.
|