[1] |
LOPEZ-ALT A, TROMER E, VAIKUNTANATHAN V. On-the-fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption [C]//Proceedings of the 2012 Annual ACM Symposium on Theory of Computing.New York:ACM, 2012: 1219-1234.
|
[2] |
QAOSAR M, ZAMANA, SIDDIQUE M.A,et al.Privacy-preserving Secure Computation of Skyline Query in Distributed Multi-party Databases[J]. Information, 2019,10(3):119-135.
|
[3] |
KIRAN A, PURI M, SURESH S. Privacy Preserving Model Using Homomorphic Encryption[J]. International Journal of Computer Applications, 2019,182(38):12-18.
|
[4] |
韩鹍, 张海林, 辛丹, 等. 利用身份的全同态加密函数库设计方法[J]. 西安电子科技大学学报, 2017,44(4):56-61.
|
|
HAN Kun, ZHANG Hailin, XIN Dan, et al. Design Method of An Identity-based Fully Homomorphic Encryption Library[J]. Journal of Xidian University, 2017,44(4):56-61.
|
[5] |
DORÖZ Y, HU Y, SUNAR B. Homomorphic AES Evaluation Using the Modified LTV Scheme[J]. Designs,Codes,and Cryptography, 2016,80(2):333-358.
|
[6] |
CHONGCHITMATE W, OSTROVSHY R. Circuit-private Multi-key FHE [C]//Lecture Notes in Computer Science:10175.Heidelberg:Springer Verlag, 2017: 241-270.
|
[7] |
CHE X L, ZHOU T P, LI N B, et al. Modified Multi-key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-switching[J]. Tsinghua Science and Technology, 2020,25(5):564-578.
|
[8] |
GENTRY C, SAHAI A, WATERS B. Homomorphic Encryption from Learning with Errors:Conceptually-simpler,Asymptotically-faster,Attribute-based [C]//Lecture Notes in Computer Science:8042.Heidelberg:Springer Verlag, 2013: 75-92.
|
[9] |
CLEAR M, MCGOLDRICK C. Multi-identity and Multi-key Leveled FHE from Learning with Errors [C]//Lecture Notes in Computer Science:9216.Heidelberg:Springer Verlag, 2015: 630-656.
|
[10] |
MUKHEJEE P, WICHS D. Two Round Multiparty Computation via Multi-key FHE [C]//Lecture Notes in Computer Science:9666.Heidelberg:Springer Verlag, 2016: 735-763.
|
[11] |
PEIKERT C, SHIEHIAN S. Multi-key FHE from LWE,Revisited [C]//Lecture Notes in Computer Science:9986.Heidelberg:Springer Verlag, 2016: 217-238.
|
[12] |
BRAKERSHI Z, PERLMAN R. Lattice-based Fully Dynamic Multi-key FHE with Short Ciphertexts [C]//Lecture Notes in Computer Science:9814.Heidelberg:Springer Verlag, 2016: 190-213.
|
[13] |
CHILLOTTI I, GAMA N, GEORGIEVA M, et al. Faster Fully Homomorphic Encryption:Bootstrapping in Less Than 0.1 Seconds [C]//Lecture Notes in Computer Science:10031.Heidelberg:Springer Verlag, 2016: 3-33.
|
[14] |
CHILLOTTI I, GAMA N, GEORGIEVA M, et al. Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE [C]//Lecture Notes in Computer Science:10624.Heidelberg:Springer Verlag, 2017: 377-408.
|
[15] |
CHEN H, CHILLOTTI I, SONG Y. Multi-key Homomorphic Encryption from TFHE [C]//Advances in Cryptology-ASIACRYPT.2019,Proceedings of 25th International Conference on the Theory and Application of Cryptology and Information Security,Berlin:Springer, 2019: 446-472.
|
[16] |
CHEN L, ZHANG Z F, WANG X Q. Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension [C]//Lecture Notes in Computer Science:10678.Heidelberg:Springer Verlag, 2017: 597-627.
|
[17] |
LI N B, ZHOU T P, YANG X Y, et al. Efficient Multi-key FHE with Short Extended Ciphertexts and Directed Decryption Protocol[J].IEEE Access, 2019(7):56724-56732.
|
[18] |
CHEN H, KIM M, DAI W, et al. Efficient Multi-key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference [C]//Proceedings of the 2019 ACM Conference on Computer and Communications Security.New York:ACM, 2019: 395-412.
|
[19] |
CHEON J H, KIM A, KIM M, et al. Homomorphic Encryption for Arithmetic of Approximate Numbers [C]//Lecture Notes in Computer Science:10624.Heidelberg:Springer Verlag, 2017: 409-437.
|
[20] |
BRAKERSKI Z, GENTRY C, VAIKUNTANATHAN V.(Leveled) Fully Homomorphic Encryption without Bootstrapping [C]//Innovations in Theoretical Computer Science Conference.New York:ACM, 2012: 309-325.
|