1. Ren, F.L., Zhu, Z.X., Wang, X.: A cloud computing security solution based on fully homomorphic encryption. J. Xi’an University of posts and telecommunications 18(3), 92–95 (2013)
2. Duan, G.H., Ju, R., Wang, Y.B., Liu, Y.: Efficient ciphertext retrieval protocol in cloud computing environment. Netinfo Secur. 9, 26–29 (2013)
3. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, vol. 9, no. 4, pp. 169–178. ACM Press, New York (2009)
4. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 84–93 (2005)
5. Lecture Notes in Computer Science;M Dijk van,2010