An Efficient Homomorphic Encryption Protocol for Multi-User Systems
暂无分享,去创建一个
[1] Ron Steinfeld,et al. Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.
[2] Dennis Hofheinz,et al. A "differential" attack on Polly Cracker , 2002, Proceedings IEEE International Symposium on Information Theory,.
[3] Rainer Steinwandt. A ciphertext-only attack on Polly Two , 2009, Applicable Algebra in Engineering, Communication and Computing.
[4] Dongho Won,et al. Advanced Key-Management Architecture for Secure SCADA Communications , 2009, IEEE Transactions on Power Delivery.
[5] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[6] Tapan Rai,et al. Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems , 2005, IACR Cryptol. ePrint Arch..
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[9] Wolfgang Henseler,et al. Digital Design , 2003 .
[10] Le Van Ly. Polly Two : A New Algebraic Polynomial-based Public-Key Scheme , 2006, Applicable Algebra in Engineering, Communication and Computing.
[11] Van-Ly Le,et al. Polly Two : A New Algebraic Polynomial-based Public-Key Scheme , 2006, Appl. Algebra Eng. Commun. Comput..
[12] Edward L. Green,et al. Infinite grobner bases and noncommutative polly cracker cryptosystems , 2004 .
[13] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[16] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[17] Rainer Steinwandt,et al. Attacking a polynomial-based cryptosystem: Polly Cracker , 2002, International Journal of Information Security.
[18] Ludovic Perret,et al. A Polly Cracker System Based on Satisfiability , 2004 .
[19] M. Fellows. Combinatorial Cryptosystems Galore! , 2022 .
[20] Rainer Steinwandt,et al. Cryptanalysis of Polly Cracker , 2002, IEEE Trans. Inf. Theory.