|
[1]
|
Gentry, C. (2009) Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the 41st Annual ACM Symposi-um on Theory of Computing, Bethesda, 31 May 2009-2 June 2009, 169-178. [Google Scholar] [CrossRef]
|
|
[2]
|
Gentry, C., Sahai, A. and Waters, B. (2013) Homomorphic Encryp-tion from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In: Canetti, R., Garay, J.A., Eds., Advances in Cryptology—CRYPTO 2013. Lecture Notes in Computer Science, vol. 8042, Springer, Berlin, 75-92. [Google Scholar] [CrossRef]
|
|
[3]
|
Regev, O. (2009) On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. Journal of the ACM, 56, 1-40. [Google Scholar] [CrossRef]
|
|
[4]
|
Al-Riyami, S.S. and Paterson, K.G. (2003) Certificateless Public Key Cryptography. In: Laih, C.S., Ed., Advances in Cryptology—ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, Springer, Berlin, 452-473. [Google Scholar] [CrossRef]
|
|
[5]
|
Boneh, D. and Franklin, M. (2001) Identity-Based Encryption from the Weil Pairing. In: Kilian, J., Ed., Advances in Cryptology—CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139, Springer, Berlin, 213-229. [Google Scholar] [CrossRef]
|
|
[6]
|
Chen, H., Hu, Y. and Lian, Z. (2017) Leveled Homomorphic En-cryption in Certificateless Cryptosystem. Chinese Journal of Electronics, 26, 1213-1220. [Google Scholar] [CrossRef]
|
|
[7]
|
Li, M. (2020) Leveled Certificateless Fully Homomorphic Encryption Schemes from Learning with Errors. IEEE Access, 8, 26749-26763. [Google Scholar] [CrossRef]
|
|
[8]
|
Banerjee, A., Peikert, C. and Rosen, A. (2012) Pseudoran-dom Functions and Lattices. In: Pointcheval, D., Johansson, T., Eds., Advances in Cryptology—EUROCRYPT 2012. Lecture Notes in Computer Science, vol 7237, Springer, Berlin, 719-737. [Google Scholar] [CrossRef]
|
|
[9]
|
李明祥, 刘照, 张明艳. 无高斯噪声的全同态加密方案[J]. 计算机应用, 2017, 37(12): 3430-3434.
|
|
[10]
|
Luo, F., Wang, F., Wang K., et al. (2018) LWR-Based Fully Homomor-phic Encryption, Revisited. Security and Communication Networks, 2018, 5967635. [Google Scholar] [CrossRef]
|
|
[11]
|
Peikert, C. (2014) A Decade of Lattice Cryptography. Foundations and Trends in Theoretical Computer Science, 10, 283-424. http://dx.doi.org/10.1561/0400000074 [Google Scholar] [CrossRef]
|
|
[12]
|
Alwen, J. and Peikert, C. (2011) Generating Shorter Bases for Hard Random Lattices. Theory of Computing Systems, 48, 535-553. [Google Scholar] [CrossRef]
|
|
[13]
|
Gentry, C., Peikert, C. and Vaikuntanathan, V. (2008) Trapdoors for Hard Lattices and New Cryptographic Constructions. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, 17-20 May 2008, 197-206. [Google Scholar] [CrossRef]
|
|
[14]
|
Micciancio, D. and Regev, O. (2007) Worst-Case to Average-Case Reductions Based on Gaussian Measures. SIAM Journal on Compu-ting, 37, 267-302. [Google Scholar] [CrossRef]
|
|
[15]
|
Micciancio, D. and Peikert, C. (2012) Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In: Pointcheval, D., Johansson, T., Eds., Advances in Cryptolo-gy—EUROCRYPT 2012. Lecture Notes in Computer Science, vol. 7237, Springer, Berlin, 700-718. [Google Scholar] [CrossRef]
|