1. Zongyu, L., Xiaolin, G., Yingjie, G., et al.: Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing[J]. Journal of Software. 029(007), 1827–1851 (2018)
2. Ristenpart, T., Tromer, E., Shacham, H., et al.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds[C]. ACM conference on computer and communications security. (2009) https://personal.utdallas.edu/~muratk/courses/cloud11f_files/cloudsec.pdf
3. Ningbo, L., Haonan, Z., Xiaoliang, C., et al.: Design of Directed Decryption Protocol Based on multi key fully homomorphic encryption in cloud environment[J]. Information network security. 20(06), 10–16 (2020)
4. Karydis I, Sioutas S, Triantafillou P et al. [Lecture Notes in Computer Science] Algorithmic Aspects of Cloud Computing Volume 9511 || SSSDB: Database with Private Information Search[J]. 2016
5. Riad, K., Ke, L., Andersson, K.: Secure storage and retrieval of IoT data based on private information retrieval[J]. Wirel. Commun. Mob. Comput. 2018, 1–8 (2018)