Author:
Xia Zhe,Yang Qiliang,Qiao Zirui,Feng Feng
Funder
National Natural Science Foundation of China
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference39 articles.
1. Joy Algesheimer, Jan Camenisch, and Victor Shoup. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In proceedings of CRYPTO 2002, pp. 417–432. Springer, 2002.
2. Deploying secure multi-party computation for financial data analysis;Bogdanov,2012
3. Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, et al. Secure multiparty computation goes live. In International Conference on Financial Cryptography and Data Security, pp. 325–343. Springer, 2009.
4. Efficient fully homomorphic encryption from (standard) LWE;Brakerski;SIAM J. Comput.,2014
5. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications;Bresson,2003
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献