Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Christian F. Tschudin,et al. On Software Protection via Function Hiding , 1998, Information Hiding.
[4] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[7] Niv Ahituv,et al. Processing encrypted data , 1987, CACM.
[8] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[9] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[10] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Ran Canetti,et al. Studies in secure multiparty computation and applications , 1995 .
[13] E. Brickell,et al. On privacy homomorphisms , 1987 .