References
- R. W. Huang, X. L. Gui, S. Yu, "Design of Privacy-Preserving Cloud Storage Framework," in Proc. of the Ninth International Conference on Grid and Cloud Computing, pp. 128-132, November 1-5, 2010.
- J. Alperin-Sheriff, C. Peikert, "Faster bootstrapping with polynomial error,". in Proc. of the International Cryptology Conference, pp. 297-314, August 17-21, 2014.
- K. Myungsun, H. T. Lee, S. Ling, H. X. Wang, "On the Efficiency of FHE-based Private Queries," IEEE Transactions on Dependable & Secure Computing, vol. 1, no.99, pp.1176-1189, 2016.
- H. S. Wang, Q. Tang, "Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE," Cryptology ePrint Archive, Report 2016/488, pp.488-505, 2016.
- J. H. Cheon, K. Han, D. Kim, "Faster Bootstrapping of FHE over the Integers," Cryptology ePrint Archive, Report 2017/079, pp.79-91,2017.
- S. Halevi, V. Shoup, "Bootstrapping for helib," in Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 641-670, April 23-30, 2015.
- Z. Brakerski, C. Gentry, V. Vaikuntanathan, "(Leveled)fully homomorphic encryption without bootstrapping," in Proc. of the 3rd Innovations in Theoretical Computer Science Conference, pp. 309-325, January 8-10, 2012.
- M. V. Dijk, C. Gentry, S. Halevi, "Fully homomorphic encryption over the integers," in Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24-43, May 30-June 3, 2010.
- Z. Brakerski, "Fully homomorphic encryption without modulus switching from classical GapSVP," in Proc. of the 32nd Annual Cryptology Conference, pp.868-886, August 19-23, 2012.
- C. Genry, A. Sahai, B. Water, "Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based," in Proc. of the 33rd Annual Cryptology Conference Advances in Cryptology, pp.75-92, August 18-22, 2013.
- L. Ducas and et al, "FHEW:Bootstrapping Homomorphic Encryption in less than a second," in Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.617-640, April 23-30, 2015.
- Z. Brakerski, V. Vaikuntanathan, "Efficient fully homomor-phic encryption from (standard) LWE," in Proc. of IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97-106, October 22-25, 2011.
- C. Gentry, S. Halevi, N. Smart, "Homomorphic evaluation of the AES circuit," in Proc. of the 32nd Annual Cryptology Conference, pp. 850-867, August 19-23, 2012.
- Z. Brakerski, C. Gentry, S. Halevi, "Packed ciphertexts in LWE-based homomorphic encryption," in Proc. of the 16th International Conference on Practice and Theory in Public-Key Cryptography, pp. 1-13, February 26 - March 1, 2013.
- R. Hiromasa, M. Abe and et al, "Packing Messages and Optimizing Bootstrapping in GSW-FHE," in Proc. of IACR International Workshop on Public Key Cryptography, pp. 699-715, March 30-April 1, 2015.
- J.Biasse, L.Ruiz, "FHEW with efficient multibit bootstrapping," in Proc. of the International Conference on Cryptology and Information Security in Latin America, pp. 119-135, August 23-26, 2015.
- I. Chillotti, N. Gama and et al, " Faster Fully Homomorphic Encryption:Bootstrapping in less than 0.1 Seconds," in Proc. of the International Conference on the Theory and Application of Cryptology and Information Security, pp. 3-33, December 4-8, 2016.
- S. Nicola, "Design and Analysis of Distributed Algorithms, 1st Edtion," Wiley, New York, 2006.
- V. V. Williams, "Multiplying matrices faster than coppersmith-winograd," in Proc. of the forty-fourth annual ACM symposium on Theory of computing, pp. 887-898, May 19-22, 2012.
- E. Dekel, D. Nassimi, S. Sahni, "Parallel matrix and graph algorithms," SIAM J. Comput, vol.10, no.4, pp.657-675, November, 1981. https://doi.org/10.1137/0210049
- D. G. R. A. Van, J. Watts, "SUMMA: scalable universal matrix multiplication algorithm," Concurrency & Computation Practice & Experience, vol.9, no.4, pp. 29-29, April, 1997.
- R. C. Agarwal, S. M. Balle, F. G. Gustavson, M. Joshi, and P. Palkar, "A three-dimensional approach to paralle matrix multiplication," IBM Journal of Research and Development, vol. 39, no. 5, pp. 575-582, September, 1995. https://doi.org/10.1147/rd.395.0575
- D. J. Evans, G. M. Megson, "A systolic simplex algorithm, 1st Edition," International Journal of Computer Mathematics, Berkshire, 1991.
- O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," in Proc. of the 37th Annual ACM Symposium on Theory of Computing, ACM, pp. 84-93, May 22-24, 2005.
- Z. G. Chen, J. Wang, X. X. Song, "Research of fully homomorphic encryption," Application and Research About Computer Journal, vol.31, no.6, pp. 1624-1630, April, 2014.