1. A Survey on Homomorphic Encryption Schemes
2. Frederik Armknecht , Stefan Katzenbeisser , and Andreas Peter . 2013. Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography , Vol. 67 , 2 ( 2013 ), 209--232. Frederik Armknecht, Stefan Katzenbeisser, and Andreas Peter. 2013. Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography , Vol. 67, 2 (2013), 209--232.
3. Laura Blackstone , Seny Kamara , and Tarik Moataz . 2020 . Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society , San Diego, California, USA. https://www.ndss-symposium.org/ndss-paper/revisiting-leakage-abuse-attacks/ Laura Blackstone, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego, California, USA. https://www.ndss-symposium.org/ndss-paper/revisiting-leakage-abuse-attacks/
4. Dan Boneh , Giovanni Di Crescenzo , Rafail Ostrovsky, and Giuseppe Persiano. 2004 . Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004 , , Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 506--522. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004 , , Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 506--522.
5. ∑oφoς