1 |
M. V. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "fully homomorphic encryption over the integers," Advances in Cryptology - EUROCRYPT, Lecture Notes in Computer Science, Vol.6110, pp.24-43, 2010.
|
2 |
김선주, 김진묵, 조인준, "모바일 클라우드 서비스상에서 준동형 암호 기반의 형상 관리 방안", 한국정보통신학회논문지, 제16권, 제10호, pp.2217-2223, 2012.
|
3 |
송유진, 박광용, "데이터베이스 아웃소싱을 위한 준동형성 암호기술", 정보보호학회지, 제19권, 제3호, pp.80-89, 2009.
과학기술학회마을
|
4 |
R. Rivest, L. Addleman, and M. Dertouzos, "On data banks and privacy homomorphism," In Foundations of Secure Computation, pp.169-177, 1978.
|
5 |
I. Damgard and M. Jurik, "A Generalization, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System," Public Key Cryptography - PKC, pp.119-136, 2001.
|
6 |
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," EUROCRYPT, pp.223-238, 1999.
|
7 |
S. Galbraith, "Elliptic curve Paillier schemes," Journal of Cryptology - JOC, Vol.15, No.2, pp.129-138, 2002.
DOI
|
8 |
C. Gentry, "Fully homomorphic encryption using ideal lattices," ACM Symposium on Theory of Computing - STOC, pp.169-178, 2009.
|
9 |
D. Boneh, E. Goh, and K. Nissm, "Evaluating 2-DNF formulars on ciphertexts," Theory of Cryptography, pp.325-341, 2005.
|
10 |
J. H. Cheon, J. S. Coron, J. Kim, M. S. Lee, T. Lepoint, M. Tibouchi, and A. Yun, "Batch fully hoomorphic encryption over the integers," Advances in Cryptology - EUROCRYPT, Lecture Notes in Computer Science, Vol.7881, pp.315-335, 2013.
|
11 |
C. Gentry and S. Halevi, "Implementing gentry's fully homomorphic encryption scheme," Advances in Cryptology - EUROCRYPT, Lecture Notes in Computer Science, Vol.6632, pp.129-148, 2011.
|
12 |
http://terms.naver.com/entry.nhn?cid=200000000&docId=1350825&mobile&categoryId=200000756
|
13 |
http://outsourcedbits.org/2012/06/26/applying-fully-homomorphic-encryption-part-1/
|