1. On data banks and privacy homomorphisms;Rivest;Found. Secur. Comput.,1978
2. Gentry, C. (June, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA.
3. Benaloh, J.D.C. (1987). Verifiable Secret-Ballot Elections. [Ph.D. Thesis, Yale University].
4. A public key cryptosystem and a signature scheme based on discrete logarithms;ElGamal;IEEE Trans. Inf. Theory,1985
5. Paillier, P. (1999, January 2–6). Public-key cryptosystems based on composite degree residuosity classes. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic.