An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption
暂无分享,去创建一个
[1] J. Fitzsimons,et al. Quantum homomorphic encryption from quantum codes , 2015, Physical Review A.
[2] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[3] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[4] Xiaojun Zhang,et al. Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme , 2014, Future Gener. Comput. Syst..
[5] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[6] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[7] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[8] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, EUROCRYPT.
[9] Yu-Guang Yang,et al. Comment on “efficient and feasible quantum private comparison of equality against the collective amplitude damping noise” , 2014, Quantum Inf. Process..
[10] Min Liang. Symmetric quantum fully homomorphic encryption with perfect security , 2013, Quantum Inf. Process..
[11] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[12] Lin Chen,et al. A quantum approach to homomorphic encryption , 2014, Scientific Reports.
[13] Seong-Moo Yoo,et al. Authentication Protocol Using Quantum Superposition States , 2009, Int. J. Netw. Secur..
[14] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[15] Stacey Jeffery,et al. Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity , 2014, CRYPTO.
[16] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[17] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[18] Christian Schaffner,et al. Quantum Homomorphic Encryption for Polynomial-Sized Circuits , 2016, CRYPTO.
[19] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[22] Peter P Rohde,et al. Quantum walks with encrypted data. , 2012, Physical review letters.
[23] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[24] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[25] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[26] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[27] Yixian Yang,et al. A blind quantum signature protocol using the GHZ states , 2013 .