This work is licensed under the Creative Commons Attribution 4.0 International License.
Rivest R. Adleman L. dertouzos M. On date banks and privacy homorphisms [M] Foundations of Secure Computation. New Yory: Academic Press. 1978: 169–180Search in Google Scholar
Gentry C. Fully homomorphic encryption using ideal lattices [C]//Proceedings of the forty-first annual ACM symposium on Theory of computing. STOC: Bethesda, MD, USA, 2009.Search in Google Scholar
Dijk M. Gentry C. Halevi S. et al. Fully homorphic encryption over the integersSearch in Google Scholar
Dowlin N, Rang B, Laine K, et a1. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy[C]//Radio and Wireless Symposium. 2016: 76–78.Search in Google Scholar
Heamifard E, Takabi H, Ghasemi M, et a1. privacy-preserving machine learning in cloud [C]//The 2017 on Cloud Computing Security Workshop. 2017: 39–43.Search in Google Scholar
Xie P, Bilenko M, Finley T, et al. Crypto-Nets: Neural Networks over Encrypted Data [J]. Computer Science, 2014.Search in Google Scholar
Qingchen Zhang, Yang Laurence-T, Chen Zhikui. Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning [J]. IEEE Transactions on Computers, 2016, 65(5): 1351–1362.Search in Google Scholar
Zhu ZongWu, Huang RuWei. Efficient SMC Protocol Based on Multi-Bit Fully Homomorphic Encryption[J]. Applied Sciences, 2021, 11(21).Search in Google Scholar
Ma Yong, Zhao Jiale, Li Kangshun, Cao Yuanlong, Chen Huyuan, Zhang Youcheng. Research Review on the Application of Homomorphic Encryption in Database Privacy Protection[J]. International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), 2021, 15(4).Search in Google Scholar
Zhang, Linlin, Zhang, Zehui, Guan, Cong. Accelerating privacy-preserving momentum federated learning for industrial cyber-physical systems[J]. Complex & Intelligent Systems, 2021, 7(6).Search in Google Scholar
Huang, Hai, Wang, Yongjian, Zong, Haoran. support vector machine classification over encrypted data[J]. Applied Intelligence, 2021 (prepublish).Search in Google Scholar
Qin Xiaoyue, Huang Ruwei, Fan Huifeng, Chen Chien Ming. An Effective NTRU-Based Fully Homomorphic Encryption Scheme[J]. Mathematical Problems in Engineering, 2021, 2021.Search in Google Scholar
Okada Hiroki, Kiyomoto Shinsaku, Cid Carlos. Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics †[J]. Information, 2021, 12(8).Search in Google Scholar
Zhou TanPing, Li NingBo, Lai QiQi, Yang XiaoYuan, Han YiLiang, Liu WenChao. Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations[J]. IET Information Security, 2021, 15(6).Search in Google Scholar
OwusuAgyemang Kwabena, Qin Zhen, Benjamin Appiah, Xiong Hu, Qin Zhiguang. Guaranteed distributed machine learning: privacy-preserving empirical risk minimization.[J]. Mathematical biosciences and engineering: MBE, 2021, 18(4).Search in Google Scholar
Hua Siliang, Zhang Huiguo, Zhang Jingya, Wang Shuchang. Optimization and implementation of the number theoretic transform butterfly unit for large integer multiplication[J]. Journal of Information Security and Applications, 2021, 59.Search in Google Scholar
R. Sendhil, A. Amuthan. Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications[J]. International Journal of Information Technology, 2021(prepublish).Search in Google Scholar
Iliashenko Ilia, Zucca Vincent. Faster homomorphic comparison operations for BGV and BFV[J]. Proceedings on Privacy Enhancing Technologies, 2021, 2021(3).Search in Google Scholar
Mittal Sonam,Ramkumar K.R. Research perspectives on fully homomorphic encryption models for cloud sector[J]. Journal of Computer Security, 2021, 29(2).Search in Google Scholar
OwusuAgyemang Kwabena, Qin Zhen, Benjamin Appiah, Xiong Hu, Qin Zhiguang. Insuring against the perils in distributed learning: privacy- preserving empirical risk minimization.[J]. Mathematical biosciences and engineering: MBE, 2021, 18(4).Search in Google Scholar
Zhang Yuanjing, Shang Tao, Liu Jianwei. A multi-valued quantum fully homomorphic encryption scheme[J]. Quantum Information Processing, 2021, 20(3).Search in Google Scholar
Liu Yuan, Pan Yun, Gu Lize, Zhang Yuan, An Dezhi, Lu Rongxing. Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext[J]. Mathematical Problems in Engineering, 2021, 2021.Search in Google Scholar
Babenko L K, Tolomanenko E A. Development of algorithms for data transmission in sensor networks based on fully homomorphic encryption using symmetric Kuznyechik algorithm[J]. Journal of Physics: Conference Series, 2021, 1812(1).Search in Google Scholar
Sun Maohua, Yang Ruidi, Hu Lei. A secure distributed machine learning protocol against static semi-honest adversaries[J]. Applied Soft Computing, 2021 (prepublish).Search in Google Scholar
Halevi Shai, Shoup Victor. Bootstrapping for HElib [J]. Journal of Cryptology, 2021, 34(1).Search in Google Scholar
Hong Seungwan, Kim Seunghong, Choi Jiheon, Lee Younho, Cheon Jung Hee. Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16.Search in Google Scholar
Meftah Souhail, Tan Benjamin Hong Meng, Mun Chan Fook, Aung Khin Mi Mi, Veeravalli Bharadwaj, Chandrasekhar Vijay. DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16.Search in Google Scholar
Kim Jeongsu,Yun Aaram. Secure Fully Homomorphic Authenticated Encryption[J]. IEEE ACCESS, 2021, 9.Search in Google Scholar
Xin Dan, Ji Jingzhou, Jing Feng, Gao Mei, Xue Bin. Efficient Fully homomorphic encryption scheme using Ring-LWE[J]. Journal of Physics: Conference Series, 2021, 1738(1).Search in Google Scholar
Kadykov Victor, Levina Alla, Voznesensky Alexander. Homomorphic Encryption within Lattice-Based Encryption System[J]. Procedia Computer Science, 2021, 186.Search in Google Scholar
Morampudi Mahesh Kumar, Prasad Munaga V.N.K., Verma Mridula, Raju U.S.N. Secure and verifiable iris authentication system using fully homomorphic encryption[J]. Computers and Electrical Engineering, 2021, 89.Search in Google Scholar
Byun J., Lee J., Park S. Privacy-preserving evaluation for support vector clustering[J]. Electronics Letters, 2020, 57(2).Search in Google Scholar
Muhammad Junaid Arshad, Muhammad Umair, Saima Munawar, Nasir Naveed, Humaira Naeem. Improving Cloud Data Encryption Using Customized Genetic Algorithm[J]. International Journal of Intelligent Systems and Applications(IJISA), 2020, 12(6).Search in Google Scholar
Cai Yunlu, Tang Chunming, Xu Qiuxia. Two-Party Privacy-Preserving Set Intersection with FHE.[J]. Entropy (Basel, Switzerland), 2020, 22(12).Search in Google Scholar
Guopeng Liao, Liao Guopeng. Multi-Candidate Electronic Voting Scheme Based on Fully Homomorphic Encryption [J]. Journal of Physics: Conference Series, 2020, 1678(1).Search in Google Scholar
Carpov Sergiu, Gama Nicolas, Georgieva Mariya, Troncoso-Pastoriza Juan Ramon. Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption.[J]. BMC medical genomics, 2020, 13(Suppl 7).Search in Google Scholar
Wu Wei, Liu Jian, Wang Huimei, Hao Jialu, Xian Ming. Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption with Ciphertext Packing Technique[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 33(10).Search in Google Scholar
Wang Wenli, Li Shundong, Dou Jiawei, Du Runmeng. Privacy-preserving mixed set operations [J]. Information Sciences, 2020, 525 (prepublish).Search in Google Scholar
Hong Mi Yeon, Yoo Joon Soo, Yoon Ji Won. Homomorphic Model Selection for Data Analysis in an Encrypted Domain dagger[J]. APPLIED SCIENCES-BASEL, 2020, 10(18).Search in Google Scholar
V. Biksham, D. Vasumathi. A lightweight fully homomorphic encryption scheme for cloud security[J]. International Journal of Information and Computer Security, 2020, 13(3-4).Search in Google Scholar