共 50 条
- [31] Towards, a separation of semantic and CCA security for public key encryption THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 434 - +
- [32] CCA-1 Secure Updatable Encryption with Adaptive Security ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V, 2023, 14442 : 374 - 406
- [33] On the security of fully homomorphic encryption for data privacy in Internet of Things CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (19):
- [34] Improving the Security Strength of Iseki's Fully Homomorphic Encryption 35TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2020), 2020, : 299 - 304
- [36] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security TECHNOLOGIES, 2019, 7 (01):
- [37] A cloud computing security solution based on fully homomorphic encryption 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
- [38] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227
- [39] Labeled PSI from Fully Homomorphic Encryption with Malicious Security PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1223 - 1237
- [40] SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 291 - 321