[1] Shor P.Algorithms for quantum computation:discrete logarithms and factoring[A].35th Annual Symposium on the Foundations of Computer Science[C].Los Alamitos,CA:IEEE Press,1994.124-134.
[2] Rivest R L,Adleman L,Dertouzos M L.On data banks and privacy homomorphisms[J].Foundations of Secure Computation,1978:169-179.
[3] Gentry C.A fully homomorphic encryption scheme[D].Stanford:Stanford University,2009.1-34.
[4] Gentry C.Computing arbitrary functions of encrypted data[J].Communications of the ACM,2010,53(3):97-104.
[5] Castelluccia C,Chan C F,Mykletun E,et al.Efficient and provably secure aggregation of encrypted data in wireless sensor networks[J].ACM Transactions on Sensor Networks,2009,5(3):1-36.
[6] Hessler A,Kakumaru T,Perrey H,et al.Data obfuscation with network coding[J].Computer Communications,2012,35(1):48-61.
[7] Rohde P P,Fitzsimons J F,Gilchrist A.Quantum walks with encrypted data[J].Physical Review Letters,2012,109(15):150501.
[8] Liang M.Quantum fully homomorphic encryption scheme based on universal quantum circuit[J].Quantum Information Processing,2015,14(8):2749-2759.
[9] Wang Y,She K,Luo Q,et al.Symmetric weak ternary quantum homomorphic encryption schemes[J].Modern Physics Letters B,2016,30(07):1650076.
[10] Ouyang Y K,Tan S H,Fitzsimons J F.Quantum homomorphic encryption from quantum codes[J].Physical Review A,2015,98:042334.
[11] Armknecht F,Augot D,Perret L,et al.On constructing homomorphic encryption schemes from coding theory[A].Cryptography and Coding,13th IMA International Conference[C].UK:Oxford,Springer,2011.23-40.
[12] Liang,M.Symmetric quantum fully homomorphic encryption with perfect security[J].Quantum Information Processing,2013,12(12):3675-3687.
[13] Broadbent A,Jeffery S.Quantum homomorphic encryption for circuits of low T-gate complexity[J].Quantum Information Processing,2015,9216:609-629.
[14] Sun X,Wang T,Sun Z,et al.An efficient quantum somewhat homomorphic symmetric searchable encryption[J].International Journal of Theoretical Physics,2017,56(4):1335-1345.
[15] Min L,Li Y.Quantum fully homomorphic encryption scheme based on quantum fault-tolerant construction[J].Quantum Information Processing,2016,25:749-759.
[16] Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[17] Thas K.The geometry of generalized Pauli operators of N-qudit Hilbert space,and an application to MUBs[A].IEEE International Conference on Systems,Man,and Cybernetics[C].Japanese:IEEE Press,2009.5:3816-3822. |