共 80 条
- [1] GOLDREICH O, MICALI S, WIGDERSON A., How to play any mental game[C], The Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218-229, (1987)
- [2] YAO A C C., How to generate and exchange secrets[C], The 27th Annual Symposium on Foundations of Computer Science, pp. 162-167, (1986)
- [3] GENTRY C., Fully homomorphic encryption using ideal lattices, The Forty-First Annual ACM Symposium on Theory of Computing, pp. 169-178, (2009)
- [4] HUANG Zhicong, LU Wenjie, HONG Cheng, Et al., Cheetah: Lean and fast secure two-party deep neural network inference[C], The 31st USENIX Security Symposium, pp. 809-826, (2022)
- [5] LU Wenjie, HUANG Zhicong, HONG Cheng, Et al., PEGASUS: Bridging polynomial and non-polynomial evaluations in homomorphic encryption[C], 2021 IEEE Symposium on Security and Privacy, pp. 1057-1073, (2021)
- [6] WEI Tao, PAN Wuqiong, LI Tingting, Et al., Trusted-environment-based privacy preserving computing: Breaks the bottleneck of ciphertext-exchange era[J], Information and Communications Technology and Policy, 48, 5, pp. 15-24, (2022)
- [7] FAN Junfeng, VERCAUTEREN F., Somewhat practical fully homomorphic encryption, Cryptology ePrint Archive, 2012, (2012)
- [8] BRAKERSKI Z, GENTRY C, VAIKUNTANATHAN V., (Leveled) fully homomorphic encryption without bootstrapping, ACM Transactions on Computation Theory, 6, 3, (2014)
- [9] CHEON J H, KIM A, KIM M, Et al., Homomorphic encryption for arithmetic of approximate numbers[C], The 23rd International Conference on the Theory and Application of Cryptology and Information Security, pp. 409-437, (2017)
- [10] GENTRY C, SAHAI A, WATERS B., Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based[C], The 33rd Annual Cryptology Conference, pp. 75-92, (2013)