参考文献
[1]陈皓勇, 李志豪, 陈锦彬, 等. 电力物联网: 数据科学视角及商业模式[J]. 电力系统保护与控制, 2020, 48(22): 3340[2]Qian Ling, Luo Zhiguo, Du Yujian, et al. Cloud computing: An overview[G] LNCCN 5931: Proc of the IEEE Int Conf on Cloud Computing. Berlin: Springer 2009: 626631[3]高胜利, 黄锐颖. 云计算环境下的数据安全问题与防护策略研究[J]. 网络安全技术与应用, 2022 (9): 7375[4]Xu X, Gu R, Dai F, et al. Multiobjective computation offloading forInternet of vehicles in cloudedge computing[J]. Wireless Networks, 2020, 26(3): 16111629[5]Gentry C. Fully homomorphic encryption using ideal lattices[C] Proc of the 41st Annual ACM Symp on Theory of Computing. New York: ACM, 2009: 169178[6]祝烈煌, 刘哲理. 数据安全与隐私计算[J]. 信息安全研究, 2022, 8(10): 954955[7]Kocabas O, Soyata T. Utilizing homomorphic encryption to implement secure and private medical cloud computing[C] Proc of the 8th IEEE Int Conf on Cloud Computing. Piscataway, NJ: IEEE, 2015: 540547[8]Atayero A A, Feyisetan O. Security issues in cloud computing: The potentials of homomorphic encryption[J]. Journal of Emerging Trends in Computing and Information Sciences, 2011, 2(10): 546552[9]李瑞琪, 贾春福, 王雅飞. 基于NTRU的多密钥同态代理重加密方案及其应用[J]. 通信学报, 2021, 42(3): 1122[10]马英. 一种基于隐私计算的数据共享模型研究[J]. 信息安全研究, 2022, 8(2): 122128[11]邵航, 李子臣, 王东飞. 基于ElGamal的同态云端密文存储检索方案[J]. 计算机系统应用, 2022, 31(10): 108115[12]Acar A, Aksu H, Uluagac A S, et al. A survey on homomorphic encryption schemes: Theory and implementation[J]. ACM Computing Surveys, 2018, 51(4): 135[13]Paillier P. Publickey cryptosystems based on composite degree residuosity classes[C] Proc of the Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999: 223238[14]Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and publickey cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120126
|