Author:
Zhang Xi,Su Ye,Wei Zhongkai,Shen Wenting,Qin Jing
Publisher
Springer Nature Singapore
Reference25 articles.
1. Lecture Notes in Computer Science;C Bösch,2011
2. Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing: improvements and extensions. In: Proceedings of CCS, pp. 1292–1303 (2016)
3. Castelluccia, C., Chan, C.F., Mykletun, E., Sudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. 5(3), 1–36 (2009)
4. Lecture Notes in Computer Science;L de Castro,2022
5. Dauterman, E., Feng, E., Luo, E., Popa, R.A., Stoica, I.: $$\{$$DORY$$\}$$: an encrypted search system with distributed trust. In: Proceedings of NSDI, pp. 1101–1119 (2020)