Computer Science ›› 2018, Vol. 45 ›› Issue (11): 169-175.doi: 10.11896/j.issn.1002-137X.2018.11.026
• Information Security • Previous Articles Next Articles
MAO He-feng, HU Bin
CLC Number:
[1]RIVEST R L,ADLEMAN L,DERTOUZOS M L.On data banks and privacy homomorphisms [J].Foundations of Secure Computation,1978,4(11):169-180. [2]GENTRY C.Fully homomorphic encryption using ideal lattices [C]∥Proc. of the 41st ACM Symposium on Theory of Computing.New York:ACM Press,2009:169-178. [3]BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le- veled) fully homomorphic encryption without bootstrapping [J].ACM Transactions on Computation Theory(TOCT),2014,6(3):13. [4]VAN DIJK M,GENTRY C,HALEVI S,et al.Fully homomorphic encryption over the integers [M]∥Advances in Cryptology-EUROCRYPT 2010.Berlin:Springer,2010:24-43. [5]GENTRY C,SAHAI A,WATERS B.Homomorphic encryption from learning with errors:Conceptually-simpler,asymptotically-faster,attribute-based [M]∥Advances in Cryptology—CRYPTO 2013.Berlin:Springer,2013:75-92. [6]NAEHRIG M,LAUTER K,VAIKUNTANATHAN V.Can homomorphic encryption be practical? [C]∥Proc. of the 3rd ACM Workshop on Cloud Computing Security Workshop.New York:ACM Press,2011:113-124. [7]GENTRY C,HALEVI S,SMART N.Homomorphic evaluation of the AES circuit [M]∥Advances in Cryptology-CRYPTO 2012.Berlin:Springer,2012:850-867. [8]CORON J S,LEPOINT T,TIBOUCHI M,et al.Batch fully homomorphic encryption over the integers [C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2013:315-335. [9]CORON J S,LEPOINT T,TIBOUCHI M.Scale-invariant fully homomorphic encryption over the integers [J].IIar Journal,2014,50(4):361-372. [10]BIHAM E.A fast new DES implementation in software [C]∥International Conference Fast Software Encryption.1997:260-271. [11]KASPER E,SCHWABE P.Faster and timing-attack resistant AES-GCM∥Cryptographic Hardware and Embedded Systems-CHES.2009:1-17. [12]BEAULIEU R,SHORS D,SMITH J,et al.The SIMON and SPECK families of lightweight block ciphers [EB/OL].IACR Cryptology ePrint Archive.http://eprint.iacr.org/2013/404.pdf. [13]SMART N P,VERCAUTEREN F.Fully homomorphic SIMD operations [J].Designs,Codes and Cryptography,2014,71(1):1-25. [14]BORGHOFF J,CANTEAUT A,GüNEYSU T,et al.PRINCE-A Low-latency Block Cipher for Pervasive Computing Applications [C]∥International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2012:208-225. |
[1] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[2] | LI Meng-tian, HU Bin. RLWE-based Fully Homomorphic Encryption Scheme with Batch Technique [J]. Computer Science, 2019, 46(3): 209-216. |
[3] | SHI Jing-qi, YANG Geng, SUN Yan-jun, BAI Shuang-jie and MIN Zhao-e. Efficient Parallel Algorithm of Fully Homomorphic Encryption Supporting Operation of Floating-point Number [J]. Computer Science, 2018, 45(5): 116-122. |
|