1. Generating hard instances of lattice problems;Ajtai,1996
2. Recommendation for key management;Barker,2016
3. Order-preserving symmetric encryption;Boldyreva,2009
4. Private database queries using somewhat homomorphic encryption;Boneh,2013
5. Evaluating 2-DNF formulas on ciphertexts;Boneh,2005