参考文献
[1] Babai L. Trading Group Theory for Randomness[C]//Proceed- ings of the 17th Annual ACM Symposium on Theory of Computing. New York, USA: ACM Press, 1985: 421-429.
[2] Goldwasser S, Micali S, Racko C. The Knowledge Com- plexity of Interactive Proof Systems[J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
[3] Kilian J. A Note on Efficient Zero-knowledge Proofs and Arguments[C]//Proceedings of the 24th Annual ACM Symposium on Theory of Computing. New York, USA: ACM Press, 1992: 723-732.
[4] Kilian J. Improved Efficient Arguments[C]//Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1995: 311-324.
[5] Micali S. Computationally Sound Proofs[J]. SIAM Journal on Computing, 2000, 30(4): 1253-1298.
[6] Goldwasser S, Kalai Y T, Rothblum G N. Delegating Compu- tation: Interactive Proofs for Muggles[C]//Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York, USA: ACM Press, 2008: 113-122.
[7] Gentry C. Fully Homomorphic Encryption Using Ideal Lat- tices[C]//Proceedings of the 41st Annual ACM Symposium on Theory of Computing. New York, USA: ACM Press, 2009: 169-178.
[8] 靳方元, 朱艳琴, 罗喜召. 基于可验全同态加密的委托计算
方案[J]. 计算机工程, 2012, 38(23): 150-153.
[9] Yao A C. Protocols for Secure Computations[C]//Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. Washington D. C., USA: IEEE Computer Society, 1982: 160-164.
[10] Yao A C. How to Generate And Exchange Secrets[C]// Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Washington D. C., USA: IEEE Computer Society, 1986: 162-167.
[11] Gennaro R, Gentry G, Parno B. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers[C]//Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2010: 465-482.
[12] Chung Kai-Min, Kalai Y T, Vadhan S P. Improved Delegation of Computation Using Fully Homomorphic Encryption[C]// Proceedings of the 30th Annual Cryptology Conference on Cryptology Advances. Berlin, Germany: Springer-Verlag, 2010: 483-501.
[13] Goldwasser S, Kalai Y, Popa R A, et al. Reusable Garbled Circuits and Succinct Functional Encryption[C]//Proceedings of the 45th Annual ACM Symposium on Theory of Computing. New York, USA: ACM Press, 2013: 555-564.
[14] Lindell Y, Pinkas B. A Proof of Security of Yao’s Protocol for Two-party Computation[J]. Journal of Cryptology, 2009, 22(2): 161-188.
[15] Oded G. 密码学基础(第二卷)[M]. 温巧燕, 杨义先, 郭奋卓,等, 译. 北京: 人民邮电出版社, 2005.
[16] Gentry C, Halevi S, Vaikuntanathan V. I-hop Homomorphic Encryption and Rerandomizable Yao Circuits[C]//Proceedings of the 30th Annual Conference on Advances in Cryptology. Santa Barbara, USA: IEEE Press, 2010: 155-172.
[17] Boneh D, Halevi S, Hamburg M, et al. Circular-secure Encryption from Decision Diffie-Hellman[C]//Proceedings of the 28th Annual Conference on Cryptology Advances in Cryptology. Santa Barbara, USA: IEEE Press, 2008: 108-125.
[18] Naor M, Segev G. Public-key Cryptosystems Resilient to Key Leakage[C]//Proceedings of the 29th Annual Conference on Advances in Cryptology. Santa Barbara, USA: IEEE Press, 2009: 18-35.
编辑 陆燕菲 |