[1] GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 200941st ACM Symposium on Theory of Computing. New York:ACM,2009:169-178. [2] VAN DIJK M,GENTRY C,HALEVI S,et al. Fully homomorphic encryption over the integers[C]//Proceedings of the 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 6110. Berlin:Springer,2010:24-43. [3] BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V. (Leveled) fully homomorphic encryption without bootstrapping[C]//Proceedings of the 2012 3rd Innovations in Theoretical Computer Science Conference. New York:ACM,2012:309-325. [4] GENTRY C,SAHAI A,WATERS B. Homomorphic encryption from learning with errors:conceptually-simpler, asymptoticallyfaster,attribute-based[C]//Proceedings of the 2013 33rd Annual Cryptology Conference, LNCS 8042. Berlin:Springer, 2013:75-92. [5] LÓPEZ-ALT A,TROMER E,VAIKUNTANATHAN V. On-the-fly multiparty computation on the cloud via multi-key fully homomorphic encryption[C]//Proceedings of the 2012 44th Annual ACM Symposium on Theory of Computing. New York:ACM, 2012:1219-1234. [6] CHILLOTTI I,GAMA N,GEORGIEVA M,et al. Faster fully homomorphic encryption:bootstrapping in less than 0.1 seconds[C]//Proceedings of the 201622nd International Conference on the Theory and Application of Cryptology and Information Security, LNCS 10031. Berlin:Springer,2016:3-33. [7] CHEON J H,KIM A,KIM M,et al. Homomorphic encryption for arithmetic of approximate numbers[C]//Proceedings of the 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, LNCS 10624. Cham:Springer,2017:409-437. [8] LAUTER K,LÓPEZ-ALT A,NAEHRIG M. Private computation on encrypted genomic data[C]//Proceedings of the 2014 3rd International Conference on Cryptology and Information Security in Latin America,LNCS 8895. Cham:Springer,2014:3-27. [9] WANG S,ZHANG Y,DAI W,et al. HEALER:Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS[J]. Bioinformatics,2016,32(2):211-218. [10] CHEON J H,KIM M,LAUTER K. Homomorphic computation of edit distance[C]//Proceedings of the 2015 International Conference on Financial Cryptography and Data Security,LNCS 8976. Berlin:Springer,2015:194-212. [11] HAMLIN A,SHELAT A,WEISS M,et al. Multi-key searchable encryption,revisited[C]//Proceedings of the 201821st IACR International Conference on Practice and Theory of Public-Key Cryptography,LNCS 10769. Cham:Springer,2018:95-124. [12] 王永建, 张健, 程少豫, 等. 面向云计算的同态加密改进设计[J]. 信息网络安全, 2017, 17(3):21-26.(WANG Y J,ZHANG J,CHENG S Y,et al. An improved design of homomorphic encryption for cloud computing[J]. Netinfo Security,2017,17(3):21-26.) [13] CHEON J H, HAN K, KIM A, et al. Bootstrapping for approximate homomorphic encryption[C]//Proceedings of the 2018 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 10820. Cham:Springer,2018:360-384. [14] CHEON J H,HAN K,KIM A,et al. A full RNS variant of approximate homomorphic encryption[C]//Proceedings of the 2018 25th International Conference on Selected Areas in Cryptography,LNCS 11349. Cham:Springer,2018:347-368. [15] CHEN H,CHILLOTTI I,SONG Y. Improved bootstrapping for approximate homomorphic encryption[C]//Proceedings of the 2019 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 11477. Cham:Springer,2019:34-54. [16] CHEN H, DAI W, KIM M, et al. Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2019:395-412. [17] BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from(standard) LWE[C]//Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. Piscataway:IEEE,2011:97-106. [18] ZHOU T,YANG X,LIU L,et al. Faster bootstrapping with multiple addends[J]. IEEE Access,2018,6:49868-49876. [19] REGEV O. On lattices, learning with errors, random linear codes,and cryptography[J]. Journal of the ACM,2009,56(6):Article No. 34. [20] 车小亮, 周昊楠, 周潭平, 等. 基于NTRU的多密钥同态加密方案解密结构[J]. 计算机应用, 2020, 40(7):1959-1964.(CHE X L,ZHOU H N,ZHOU T P,et al. Decryption structure of multikey homomorphic encryption scheme based on NTRU[J]. Journal of Computer Applications,2020,40(7):1959-1964.) [21] GENTRY C,HALEVI S,SMART N P. Homomorphic evaluation of the AES circuit[C]//Proceedings of the 201232nd Annual Cryptology Conference,LNCS 7417. Berlin:Springer,2012:850-867. |