1. [1] BONEH, D.—GOH, E.—NISSIM, K.: Evaluating 2-DNF formulas on ciphertexts, in: Theory of Cryptography—TCC ’05, Lecture Notes in Comput. Sci., Vol. 3378, Springer-Verlag, Berlin, 2005, pp. 325–341.
2. [2] BRAKERSKI, A., LANGLOIS, A., PEIKERT, C.—REGEV, O.—STEHLÉ, D.: Classical hardness of learning with errors, in: Symposium on Theory of Computing—STOC ’13, ACM New York, NY, USA, 2013, pp. 575–584.
3. [3] BRAKERSKI, A.—VAIKUNTANATHAN, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages, in: Advances in cryptology–CRYPTO ’11, (P. Rogaway, ed.), Lecture Notes in Comput. Sci., Vol. 6841, Springer, Heidelberg, 2011. pp. 505–524.
4. [4] GENTRY, C.: Fully homomorphic encryption using ideal lattices, in: Proceedings of the 41th Symposium on Theory of Computing—STOC ’09, ACM New York, NY, USA, 2009, pp. 169–178.
5. [5] LAUTER, K.—NAEHRIG, M.—VAIKUNTANATHAN, V.: Can homomorphic encryption be practical ?, in: Proceedings of the 3rd ACM workshop on Cloud computing security workshop—CCSW ’11, ACM New York, NY, USA, 2011, pp. 113–124.