[1] GENTRY C. Fully Homomorphic Encryption Using Ideal Lattices[C]//Proceedings of the Annual ACM Symposium on the Theory of Computing. New York: ACM, 2009: 169-178.
[2] NUIDA K, KUROSAWA K. (Batch) Fully Homomorphic Encryption over Integers for Non-binary Message Spaces[C]//Lecture Notes in Computer Science: 9056. Heidelberg: Springer Verlag, 2015: 537-555.
[3] CHEON J H, HONG H, LEE M S, et al. The Polynomial Approximate Common Divisor Problem and Its Application to the Fully Homomorphic Encryption[J]. Information Sciences, 2016, 326: 41-58.
[4] COSTACHE A, SMART N P. Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?[C]//Lecture Notes in Computer Science: 9610. Heidelberg: Springer Verlag, 2016: 325-340.
[5] SHAMIR A. Identity-based Cryptosystems and Signature Schemes[C]//Lecture Notes in Computer Science: 21. Heidelberg: Springer Verlag, 1984: 47-53.
[6] GENTRY C, HALEVI S, VAIKUNTANATHAN V. A Simple BGN-type Cryptosystem from LWE[C]//Lecture Notes in Computer Science: 6110. Heidelberg: Springer Verlag, 2010: 506-522.
[7] REGEV O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography[J]. Journal of the ACM, 2009, 56(6): 34.
[8] GENTRY C, SAHAI A, WATERS B. Homomorphic Encryption from Learning with Errors: Conceptually-simpler, Asymptotically-faster, Attribute-based[C]//Lecture Notes in Computer Science: 8042. Heidelberg: Springer Verlag, 2013: 75-92.
[9] 光焱, 祝跃飞, 费金龙, 等. 利用容错学习问题构造基于身份的全同态加密体制[J]. 通信学报, 2014, 35(2): 111-117.
GUANG Yan, ZHU Yuefei, FEI Jinlong, et al. Identity-based Fully Homomorphic Encryption from LWE Problem[J]. Journal on Communications, 2014, 35(2): 111-117.
[10] 康元基, 顾纯祥, 郑永辉, 等. 利用特征向量构造基于身份的全同态加密体制[J]. 软件学报, 2016, 27(6): 1487-1497.
KANG Yuanji, GU Chunxiang, ZHENG Yonghui, et al. Identity-based Fully Homomorphic Encryption from Eigenvetor[J]. Journal of Software, 2016, 27(6): 1487-1497.
[11] LYUBASHEVSKY V, PEIKERT C, REGEV O. A Toolkit for Ring-LWE Cryptography[C]//Lecture Notes in Computer Science: 7881. Heidelberg: Springer Verlag, 2013, 13: 35-54.
[12] HALEVI S, SHOUP V. HElib—an Implementation of Homomorphic Encryption[C]//Lecture Notes in Computer Science: 8616. Heidelberg: Springer Verlag, 2014: 554-571.
[13] BRAKERSKI Z, GENTRY C, VAIKUNTANATHAN V. (Leveled)Fully Homomorphic Encryption Without Bootstrapping[C]//Proceedings of the Innovations in Theoretical Computer Science Conference. New York: ACM, 2012: 309-325.
[14] DUCAS L, MICCIANCIO D. FHEW: Bootstrapping Homomorphic Encryption in Less than a Second[C]//Lecture Notes in Computer Science: 9056. Heidelberg: Springer Verlag, 2015: 617-640.
[15] BOS J W, LAUTER K, LOFTUS J, et al. Improved Security for a Ring-based Fully Homomorphic Encryption Scheme[C]//Lecture Notes in Computer Science: 8308. Heidelberg: Springer Verlag, 2013: 45-64. |