共 5 条
[1]
(Leveled) Fully Homomorphic Encryption without Bootstrapping[J] . Zvika Brakerski,Craig Gentry,Vinod Vaikuntanathan.ACM Transactions on Computation Theory (TOCT) . 2014
[2]
A method for obtaining digital signatures and public-key cryptosystems[J] . R. L. Rivest,A. Shamir,L. Adleman.Communications of the ACM . 1983 (1)
[3]
IntegriDB:Verifiable SQL for outsourced databases .2 ZHANG Y,KATZ J,PAPAMANTHOU C. The 22nd ACM SIGSAC Conference on Computer and Communications Security . 2015
[4]
TWORAM:Round-Optimal Oblivious RAM with Applications to Searchable Encryption .2 Garg S,Mohassel P,Papamanthou C. Journal of Chinese Agricultural Mechanization . 2015
[5]
Fully homomorphic encryption using ideal lattices .2 Gentry C. the 41st ACM Symposium on Theory of Computing (STOC’’09) . 2009

