[1]Gentry C. Fully homomorphic encryption using ideal lattices[C] Proc of the 41st Annual ACM Symp on Theory of Computing (STOC’09). New York: ACM, 2009: 169178[2]李雅硕, 龙春, 魏金侠, 等. 基于同态加密的人脸识别隐私保护方法[J]. 信息安全研究, 2023, 9(9): 843850[3]李安, 周亮, 张建青, 等. 用于实现医学图像对比度增强的密文域可逆信息隐藏算法[J]. 上海理工, 2024, 46(1): 95102[4]Paterson M S, Stockmeyer L J. On the number ofnonscalar multiplications necessary to evaluate polynomials[J]. SIAM Journal on Computing, 1973, 2(1): 6066[5]Cheon J H, Kim D, Kim D. Efficient homomorphic comparison methods with optimal complexity[COL]. 2020 [20240424]. https:doi.org10.10079783030648433.8[6]Feng X, Li X, Zhou S, et al. Homomorphic comparison method based on dynamically polynomial composite approximating sign function[C] Proc of 2023 IEEE Conf on Communications and Network Security (CNS). Piscataway, NJ: IEEE, 2023: 19[7]Lee E, Lee J W, Kim Y S, et al. Minimax approximation of sign function by composite polynomial for homomorphic comparison[J]. IEEE Trans on Dependable and Secure Computing, 2022, 9(6): 37113727[8]Cheon J H, Kim A, Kim M, et al. Homomorphic encryption for arithmetic of approximate numbers[C] Advances in Cryptology—ASIACRYPT 2017. Berlin: Springer, 2017: 409437[9]GitHub. HEAAN[EBOL]. 2023 [20240424]. https:github.comSnucryptoHEAAN