Citation: | Caifen WANG, Yudan CHENG, Chao LIU, Bing ZHAO, Qinbai XU. Multiple to One Fully Homomorphic Encryption Scheme over the Integers[J]. Journal of Electronics & Information Technology, 2018, 40(9): 2119-2126. doi: 10.11999/JEIT171194 |
RIVEST R. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120–126 doi: 10.1145/357980.358017
|
GENTRY C. Fully homomorphic encryption using ideal lattices[C]. ACM Symposium on Theory of Computing, Bethesda, USA, 2009: 169–178.
|
DIJK M, GENTRY C, HALEVI S, et al. Fully homomorphic encryption over the integers[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Heidelberg, 2010: 24–43.
|
STEHLE D and STEINFELD R. Faster fully homomorphic encryption[C]. Advances in Cryptology-ASIACRYPT 2010, International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 2010: 377–394.
|
GENTRY C and HALEVI S. Implementing Gentry’s fully-homomorphic encryption scheme[C]. Advances in Cryptology-EUROCRYPT 2011, International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 2011: 129–148.
|
SMART N and VERCAUTEREN F. Fully homomorphic encryption with relatively small Key and ciphertext sizes[C]. International Conference on Practice and Theory in Public Key Cryptography, Paris, France, 2010: 420–443.
|
CHENAL M and TAHG Q. On key recovery attacks against existing somewhat homomorphic encryption schemes[J]. Lecture Notes in Computer Science, 2014, 8895: 239–258 doi: 10.1007/978-3-319-16295-9_13
|
TANG Dianhua and ZHU Shixiong. Faster fully homomorphic encryption scheme over integer[J]. Computer Engineering&Applications, 2012, 48(28): 117–122 doi: 10.3778/j.issn.1002-8331.2012.28.023
|
GU Chunsheng, JING Zhengjun, YU Zhimin et al. Breaking faster fully homomorphic encryption scheme over integer[J]. Computer Engineering&Applications, 2013, 49(21): 101–105 doi: 10.3778/j.issn.1002-8331.1201-0401
|
光焱, 顾纯祥, 祝跃飞, 等. 一种基于LWE问题的无证书全同态加密体制[J]. 电子与信息学报, 2013, 35(4): 988–993 doi: 10.3724/SP.J.1146.2012.01102
GUANG Yan, GU Chunxiang, ZHU Yuefei, et al. Certificateless fully homomorphic encryption based on LWE problem[J]. Journal of Electronics&Information Technology, 2013, 35(4): 988–993 doi: 10.3724/SP.J.1146.2012.01102
|
古春生. 近似理想格上的全同态加密方案[J]. 软件学报, 2015, 26(10): 2696–2719 doi: 10.13328/j.cnki.jos.004808
Gu Chunsheng. Fully homomorphic encryption from approximate ideal lattices[J]. Journal of Software, 2015, 26(10): 2696–2719 doi: 10.13328/j.cnki.jos.004808
|
熊婉君, 韦永壮, 王会勇. 一个基于整数的全同态加密改进方案[J]. 密码学报, 2016, 3(1): 67–78 doi: 10.13868/j.cnki.jcr.000110
XIONG Wanjun, WEI Yongzhuang, and WANG Huiyong. An improved fully homomorphic encryption scheme over the integers[J]. Journal of Cryptologic Research, 2016, 3(1): 67–78 doi: 10.13868/j.cnki.jcr.000110
|
HU Renyuan, ZHANG Longjun, and QIN Yongzhen. Improved fully homomorphic encryption algorithm for cloud storage[C]. International Conference on Communications, Information Management and Network Security, Shanghai, China, 2016: 349–352.
|
夏超.同态加密技术及其应用研究[D]. [硕士论文], 安徽大学, 2013.
XIA Chao. Research of homomorphic encryption technolosgy and application[D]. [Master dissertation], Anhui University, 2013.
|