[1]RIVEST R,SHAMIR A,DERTOUZOS M.On data banks and privacy homomorphisms[J].Foundations of Secure Computation,1978,7(1):169-177.[1]RIVEST R,SHAMIR A,DERTOUZOS M.On data banks and privacy homomorphisms[J].Foundations of Secure Computation,1978,7(1):169-177.[1]RIVEST R,SHAMIR A,DERTOUZOS M.On data banks and privacy homomorphisms[J].Foundations of Secure Computation,1978,7(1):169-177.[1]RIVEST R,SHAMIR A,DERTOUZOS M.On data banks and privacy homomorphisms[J].Foundations of Secure Computation,1978,7(1):169-177.br/
[2]陈智罡,王箭,宋新霞.全同态加密研究[J].计算机应用研究,2014,31(6):1624-1630.br/
[3]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.br/
[4]ONOMZA W V.Big data analytics and data security in the cloud via fully homomorphic encryption[J].International Journal of Computer,Electrical,Automation,Control and Information Engineering,2015,9(5):744-753.br/
[5]GENTRY C.Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,2009:169-178.br/
[6]DIJK M V,GENTRY C,HALEVI S,et al.Fully homomorphic encryption over the integers[M].Berlin,Germany:Springer,2010.br/
[7]JEAN-SBASTIEN C,MANDAL A,NACCACHE D,et al.Fully homomorphic encryption over the integers with shorter public keys[C]//Proceedings of Conference on Advances in Cryptology.Berlin,Germany:Springer,2011:487-504.br/
[8]CORON J,NACCACHE D,TIBOUCHI M,et al.Public key compression and modulus switching for fully homomorphic encryption over the integers[C]//Proceedings of Conference on Advances in Cryptology.Berlin,Germany:Springer,2012:446-464.br/
[9]CHEON J H,CORON J,KIM J,et al.Batch fully homomorphic encryption over the integers[C]//Proceedings of Conference on Advances in Cryptology.Berlin,Germany:Springer,2013:315-335.br/
[10]林如磊,王箭,杜贺.整数上的全同态加密方案的改进[J].计算机应用研究,2013,30(5):1515-1519.br/
[11]汤殿华,祝世雄,曹云飞.整数上全同态加密方案的重加密技术[J].信息安全与通信保密,2012(1):76-79.br/
[12]陈智罡,王箭,王梅娟.整数上的全同态加密分析[C]//中国密码学会2012年会论文集.合肥:[出版者不详],2012:164-169.br/
[13]徐鹏,刘超,斯雪明.基于整数多项式环的全同态加密算法[J].计算机工程,2012,38(24):1-4.br/
[14]汤全有,马传贵.针对全同态加密体制的反馈攻击[J].计算机工程,2014,40(6):79-84.br/
[15]NUIDA K,KUROSAWA K.Fully homomorphic encryption over integers for non-binary message spaces[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2015:537-
555.br/ |