[1] |
Gentry C.Fully homomorphic encryption using ideal lattices [C] ∥Proc of the 41st Annual ACM Symposium on Theory of Computing,2009:169-178.
|
[2] |
Qaosar M,Zaman A,Siddique M A,et al.Privacy-preserving secure computation of skyline query in distributed multi- party databases [J].Information,2019,10(3):119.
|
[3] |
López-Alt A,Tromer E,Vaikuntanathan V.On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption [C] ∥Proc of the 44th Annual ACM Symposium on Theory of Computing,2012:1219-1234.
|
[4] |
Dorz Y, Hu Y, Sunar B.Homomorphic AES evaluation using the modified LTV scheme [J].Designs,Codes and Cryptography,2016,80(2):333-358.
|
[5] |
Chongchitmate W, Ostrovsky R. Circuit-private multi-key FHE[C]∥Proc of the IACR International Workshop on Public Key Cryptography,2017:241-270.
|
[6] |
Che X L,Zhou T P,Li N B,et al.Modified multi-key fully homomorphic encryption based on NTRU cryptosystem without key-switching [J].Tsinghua Science and Technology,2020,25(5):564-578.
|
[7] |
Li Ning-bo,Zhou Tan-ping,Che Xiao-liang,et al.Overview on multi-key fully homomorphic encryption [J].Journal of Cryptologic Research,2020,7(6):713-734.(in Chinese)
|
[8] |
Clear M,McGoldrick C.Multi-identity and multi-key leveled FHE from learning with errors[C]∥Proc of the 35th Annual Cryptology Conference,2015:630-656.
|
[9] |
Gentry C,Sahai A,Waters B.Homomorphic encryption from learning with errors:Conceptually-simpler,asymptotically-faster,attribute-based[C]∥Proc of the 33rd Annual Cryptology Conference,2013:75-92.
|
[10] |
Mukherjee P,Wichs D.Two round multiparty computation via multi-key FHE[C]∥Proc of the Annual International Conference on the Theory and Applications of Cryptographic Techniques,2016:735-763.
|
[11] |
Peikert C,Shiehian S.Multi-key FHE from LWE,revisited[C]∥Proc of the 13th Theory of Cryptography Conference,2016:217-238.
|
[12] |
Brakerski Z,Perlman R.Lattice-based fully dynamic multi-key FHE with short ciphertexts[C]∥Proc of the 36th Annual International Cryptology Conference,2016:190-213.
|
[13] |
Chen L, Zhang Z,Wang X.Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension[C]∥Proc of the 15th International Conference on Theory of Cryptography,2017:597-627.
|
[14] |
Brakerski Z,Gentry C,Vaikuntanathan V.(Leveled) Fully homomorphic encryption without bootstrapping [J].ACM Transactions on Computation Theory,2014,6(3):1-36.
|
[15] |
Li N, Zhou T, Yang X,et al.Efficient multi-key FHE with short extended ciphertexts and directed decryption protocol [J].IEEE Access,2019,7:56724-56732.
|
[16] |
Chen H, Dai W, Kim M,et al.Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference [C] ∥Proc of the 2019 ACM SIGSAC Conference on Computer and Communications Security,2019:395-412.
|
[17] |
Zhou T P,Zhang Z F,Chen L,et al.Multi-key fully homomorphic encryption scheme with compact ciphertext [EB/OL]. [2022-01-30]. https://ia.cr/2021/1131.
|
[18] |
Cheon J H,Kim A,Kim M,et al.Homomorphic encryption for arithmetic of approximate numbers[C]∥Proc of the 23rd International Conference on the Theory and Application of Cryptology and Information Security,2017:409-437.
|
|
附中文参考文献:
|
[7] |
李宁波,周潭平,车小亮,等.多密钥全同态加密研究[J].密码学报,2020,7(6):713-734.
|