[1] |
黄鑫. 云计算环境下的加密方式探索分析[J]. 科技风,2013(3):202.
|
[2] |
李顺东,窦家维,王道顺.同态加密算法及其在云安全中的应用[J].计算机研究与发展,2015,52(6):1378-1388.
|
[3] |
RIVEST R L,ADLEMAN L,DERTOUZOS M L.On data Banks and Privacy Homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180.
|
[4] |
唐春明,郑晓龙. 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全,2015(2):19-25.
|
[5] |
王辉. 同态加密的分析与优化[D].杭州:杭州电子科技大学,2012.
|
[6] |
EIGAMAL T.A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J].IEEE Trans on Information Theory,1985,31(4):469-472.
|
[7] |
PAILLIER P.Public-Key Cryptosystems Based on Composite Degree Residuosity Classes[C]// Proc of Eurocrypt'99.LNCS 1592,May 2-6,1999,Berlin Heidelberg.Berlin:Springer-Verlag,1999:223-238.
|
[8] |
BENALOHJ.Verifiablescret-Ballot Elections[D].New Haven,CT:Department of Computer Science,Yale University,1988.
|
[9] |
OKAMOTO T, UCHIYAMA S.A New Public-Key Cryptosystem as Secure as Factoring[C]// Proc of Eurocrypt'98.Advances in Cryptology, May 25-30,1998,Berlin Heidelberg.Berlin:Springer-Verlag,1998:308-318.
|
[10] |
NACCACHE D, STERN J.A New Public Key Cryptosystem Based on Higher Residues[C]// Univ.of New Mexico,USA.Proc of the 5th ACM Conference on Computer and Communications Security, November 9-13,1998,New York,WA,USA. NewYork:ACM Press,1998:59-66.
|
[11] |
BONEH D, Goh E J, Nissim K.Evaluating 2-DFN Formulas on Cipher Texts[C]// Univ.ofLondon,UK. Proc of the 2nd International Conference on Theory of Cryptography, November 16-19,2005,London,UK.Berlin: Springer-Verlag,2005:325-341.
|
[12] |
FELLOWS M, KOBLITZ N.Combinatorial Cryptosystems Galore[C]// Proc of Eurocrypt'93. LNCS 1122:Proc of the 2nd IntSymp on Finite Fields,July 23-28,1993,Las Vegas,USA.Berlin:Springer-Verlag,1993:51-61.
|
[13] |
GENTRY C.Fully Homomorphic Eneryption Using Ideal Lattices[C]// ACM Special Interest Group on Algorithms and Computation Theory. Proc of the 41st Annual ACM Symposium on Theory of Computing, May 31-June 2,2009,Bethesda,Maryland,USA. NewYork:ACM Press,2009:169-178.
|
[14] |
GENTRY C.A Fully Homomorphic Encryption Scheme[D]. Stanford, CA : Stanford University,2009.
|
[15] |
STEHLE D, STEINFELDR. Faster Fully Homomorphic Encryption[C]// Univ.ofSingapore. LNCS 6477:Proc of the 16th Int Conf on the Theory and Application of Cryptology and Information Security, December 5-9,2010,Singapore. Berlin:Springer-Verlag,2010:377-394.
|
[16] |
CORON J S, MANDAL A, NACCACHE D, et a1. Fully Homomorphic Encryption Over the Integers With Shorter Public Keys[C]// Proc of Crypto 2011.LNCS 6841,August 2-7,2011,Berlin Heidelberg.Berlin:Springer-Verlag,2011:487-504.
|
[17] |
LIANGM.Quantum Fully Homomorphic Encryption Scheme Based on Universal Quantum Circuit[J].Quantum Information Processing,2014,14(8):1-11.
|
[18] |
DULEK Y, SCHAFFNER C, SPEELMAN F.Quantum Homomorphic Encryption for Polynomial-Sized Circuits[C]//.CRYPTO 2016.LNCS 9816,August 14-18,2016,Santa Barbara,CA,USA.Berlin:Springer-Verlag,2016:3-32.
|
[19] |
马威,韩臻,成阳. 可信云计算中的多级管理机制研究[J]. 信息网络安全,2015(7):20-25.
|
[20] |
宋丹劼. 基于同态加密的云存储系统设计与实现[D].北京:北京邮电大学,2013.
|
[21] |
黄丛林,仲红,汪益民.基于中国剩余定理的群签名改进方案[J].计算机科学,2016,43(3):174-178.
|
[22] |
杨波,李顺东,周素芳.基于El Gamal签名的隐私保护网上交易方案[J].计算机应用研究,2014,31(12):3707-3710.
|
[23] |
张弛. 利用图片作为载体实现信息隐藏[J]. 牡丹江师范学院学报,2008(1):20-21.
|
[24] |
石井,吴哲,谭璐,等.RSA数据加密算法的分析与改进[J]. 济南大学学报(自然科学版),2013(3):283-286.
|
[25] |
杨学庆,柳重堪.基于DNA计算的RSA密码系统攻击方法[J].计算机工程,2010,36(2):1-3.
|