Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference28 articles.
1. Agrawal, S, Boneh D, Boyen X (2010) Efficient lattice (H)IBE in the standard model In: Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, 553–572.. Springer, Berlin, Heidelberg. May 30 - June 3, 2010. Proceedings.
https://doi.org/10.1007/978-3-642-13190-5_28
.
2. Boneh, D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301–1328.
https://doi.org/10.1137/S009753970544713X
.
3. Brakerski, Z, Vaikuntanathan V (2011a) Efficient fully homomorphic encryption from (standard) LWE In: IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011., 97–106.. IEEE Computer Society, Washington. October 22-25, 2011.
https://doi.org/10.1109/FOCS.2011.12
.
4. Brakerski, Z, Vaikuntanathan V (2011b) Fully homomorphic encryption from ring-lwe and security for key dependent messages In: Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference,505–524.. Springer, Heidelberg. August 14-18, 2011. Proceedings.
https://doi.org/10.1007/978-3-642-22792-9_29
.
5. Brakerski, Z, Gentry C, Vaikuntanathan V (2012) (leveled) fully homomorphic encryption without bootstrapping In: Innovations in Theoretical Computer Science - ITCS 2012, 309–325.. ACM, New York. January 8-10, 2012.
http://doi.acm.org/10.1145/2090236.2090262
.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献