共 50 条
- [41] Fully Homomorphic Encryption over the Integers: From Theory to Practice NTT Technical Review, 2014, 12 (07): : 24 - 29
- [42] Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 69 - 98
- [43] Fully Homomorphic Encryption from the Finite Field Isomorphism Problem PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 125 - 155
- [44] Labeled PSI from Fully Homomorphic Encryption with Malicious Security PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1223 - 1237
- [45] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
- [46] Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 107 - 127
- [47] On DGHV and BGV Fully Homomorphic Encryption Schemes 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
- [48] Minimizing ESOP Expressions for Fully Homomorphic Encryption 2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
- [49] The Implemention and Application of Fully Homomorphic Encryption Scheme PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
- [50] Practical Fully Homomorphic Encryption for Fully Masked Neural Networks CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 24 - 36