ICDM: An Encryption That Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted Data
暂无分享,去创建一个
Jing Yao | Xiaolin Gui | Pan Yang | Feng Tian | Jiancai Lin | Xiaolin Gui | Pan Yang | Feng Tian | Jing Yao | Jiancai Lin
[1] Jean-Sébastien Coron,et al. Fully Homomorphic Encryption over the Integers with Shorter Public Keys , 2011, IACR Cryptol. ePrint Arch..
[2] Ruwei Huang,et al. Privacy-Preserving Computable Encryption Scheme of Cloud Computing: Privacy-Preserving Computable Encryption Scheme of Cloud Computing , 2012 .
[3] Chen-Mou Cheng,et al. Solving Quadratic Equations with XL on Parallel Architectures , 2012, CHES.
[4] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[5] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[8] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[9] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[10] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[11] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[12] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[15] Hao-miao Yang,et al. A New Somewhat Homomorphic Encryption Scheme over Integers , 2012, 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring.
[16] Huang Ru. Privacy-Preserving Computable Encryption Scheme of Cloud Computing , 2011 .