暂无分享,去创建一个
[1] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[2] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Zhenfu Cao,et al. Extended attribute based encryption for private information retrieval , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[4] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[5] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[8] Tal Malkin,et al. Secure anonymous database search , 2009, CCSW '09.
[9] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[10] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[11] Toru Nakamura,et al. Anonymous authentication systems based on private information retrieval , 2009, 2009 First International Conference on Networked Digital Technologies.
[12] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[13] Philippe Gaborit,et al. A fast private information retrieval protocol , 2008, 2008 IEEE International Symposium on Information Theory.
[14] Elisa Bertino,et al. Controlling data disclosure in computational PIR protocols , 2010, ASIACCS '10.
[15] Craig Gentry,et al. Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.