1. Abbas A et al (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (Csur) 51(4):1–35
2. Diffie W, Hellman ME (2019) New directions in cryptography. In: Secure communications and asymmetric cryptosystems. Routledge, pp 143–180
3. Taher EG (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472
4. Pascal P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 223–238
5. Craig G (2009) A fully homomorphic encryption scheme. Stanford university