| [1]隐私计算联盟, 中国信息通信研究院云计算与大数据研究所. 隐私计算白皮书(2022年)[R]. 北京: 中国信息通信研究院, 2022[2]Gentry C. A Fully Homomorphic Encryption Scheme[M]. Palo Alto: Stanford University, 2009[3]Hayward R, Chiang C C. Parallelizing fully homomorphic encryption for a cloud environment[J]. Journal of Applied Research and Technology, 2015, 13(2): 245252[4]Al Badawi A, Polyakov Y, Aung K M M, et al. Implementation and performance evaluation of RNS variants of the BFV homomorphic encryption scheme[J]. IEEE Trans on Emerging Topics in Computing, 2019, 9(2): 941956[5]Fan J, Vercauteren F. Somewhat practical fully homomorphic encryption[JOL]. Cryptology ePrint Archive, 2012 [20260201]. https:eprint.iacr.org2012144[6]Dorevi G, Markovi M, Vuleti P. Evaulation of homomorphic encryption implementation on iot device[J]. JITAAPEIRON, 2022, 23(1): 3239[7]Goldwasser S, Micali S, Rackoff C. Theknowledge complexity of interactive proofsystems[C] Proc of the 17th Annual ACM Symp on Theory of Computing. New York: ACM, 1985: 291304[8]Samudrala S, Wu J, Chen C, et al. Performance analysis of zeroknowledge proofs[C] Proc of the 2024 IEEE Int Symp on Workload Characterization (IISWC). Piscataway, NJ: IEEE, 2024: 144155[9]Salleras X, Daza V. ZPiE: Zeroknowledge proofs in embedded systems[J]. Mathematics, 2021, 9(20): 2569[10]von Maltitz M, Carle G. A performance and resource consumption assessment of secret sharing based secure multiparty computation[C] Proc of Int Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology. Berlin: Springer, 2018: 357372[11]Guo C, Hannun A, Knott B, et al. Secure multiparty computations in floatingpoint arithmetic[J]. Information and Inference: A Journal of the IMA, 2022, 11(1): 103135[12]BenEfraim A, Lindell Y, Omri E. Optimizing semihonest secure multiparty computation for the Internet[C] Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 578590[13]Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping[J]. ACM Trans on Computation Theory (TOCT), 2014, 6(3): 136[14]Cheon J H, Kim A, Kim M, et al. Homomorphic encryption for arithmetic of approximate numbers[C] Proc of the 23rd Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 2017: 409437[15]Chen H, Laine K, Player R. Simple encrypted arithmetic librarySEAL v2.1[G] LNCS 10323: Proc of Int Conf on Financial Cryptography and Data Security. Berlin: Springer, 2017: 318[16]Halevi S, Shoup V. Design and implementation of HElib: A homomorphic encryption library[JOL]. Cryptology ePrint Archive, 2020 [20260201]. https:eprint.iacr.org20201481[17]Polyakov Y, Rohloff K, Ryan G W. Palisade lattice cryptography library[R]. Newark, NJ: Cybersecurity Research Center, New Jersey Institute of Technology, 2017[18]Hallman R A, Laine K, Dai W, et al. Building applications with homomorphic encryption[C] Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2018: 21602162[19]Dierks T, Allen C. The TLS protocol version 1.0[ROL]. 1999 [20260201]. https:www.rfceditor.orgrfcrfc2246.txt[20]Gennaro R, Gentry C, Parno B, et al. Quadratic span programs and succinct NIZKs without PCPs[C] Proc of the 32nd Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2013: 626645[21]Hopwood D, Bowe S, Hornby T, et al. Zcash protocol specification[R]. San Francisco, CA: GitHub, 2016[22]Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized anonymous payments from bitcoin[C] Proc of the 2014 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2014: 459474[23]Groth J. On the size of pairingbased noninteractive arguments[C] Proc of the 35th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2016: 305326[24]Gabizon A, Williamson Z J, Ciobotaru O. Plonk: Permutations over lagrangebases for oecumenical noninteractive arguments of knowledge[JOL]. Cryptology ePrint Archive, 2019 [20260201]. https:eprint.iacr.org2019953[25]Bowe S, Grigg J, Hopwood D. Halo: Recursive proof composition without a trusted setup[EBOL]. 2019 [20250717]. https:eprint. iacr. org20191021[26]Soureshjani F H, HallAndersen M, Jahanara M M, et al. Automated analysis of Halo2 circuits[JOL]. Cryptology ePrint Archive, 2023 [20260201]. https:eprint.iacr.org20231051[27]Cerulli A. Efficient zeroknowledge proofs and their applications[D]. London: University College London, 2019[28]Mohanty T, Srivastava V, Debnath S K, et al. Quantum secure protocols for multiparty computations[J]. Journal of Information Security and Applications, 2025, 90: 104033[29]BenSasson E, Bentov I, Horesh Y, et al. Scalable, transparent, and postquantum secure computational integrity[JOL]. Cryptology ePrint Archive, 2018 [20260201]. https:eprint.iacr.org2018046[30]Akram R N, Markantonakis K, Mayes K. An introduction to the trusted platform module and mobile trusted module[M] Secure Smart Embedded Devices, Platforms and Applications. Berlin: Springer, 2013: 7193[31]Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: What it is, and what it is not[C] Proc of the 2015 IEEE TrustcomBigDataSEIspa. Piscataway, NJ: IEEE, 2015: 5764[32]Micali S, Goldreich O, Wigderson A. How to play any mental game[C] Proc of the 19th ACM Symp on Theory of Computing. New York: ACM, 1987: 218229[33]BenOr M, Goldwasser S, Wigderson A. Completeness theorems for noncryptographic faulttolerant distributed computation[C] Proc of the 20th Annual ACM Symp on Theory of Computing. New York: ACM, 1988: 110[34]Damgrd I, Pastro V, Smart N, et al. Multiparty computation from somewhat homomorphic encryption[C] Annual Cryptology Conference. Berlin: Springer, 2012: 643662[35]Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612613[36]Catrina O, Hoogh S. Improvedprimitives for secure multiparty integer computation[C] Proc of the Int Conf on Security and Cryptography for Networks. Berlin: Springer, 2010: 182199[37]Vukasovic M, Miladinovic D, Milakovic A, et al. Programming applications suitable for secure multiparty computation based on trusted execution environments[C] Proc of the 30th Telecommunications Forum (TELFOR). Piscataway, NJ: IEEE, 2022: 14[38]Anati I, Gueron S, Johnson S, et al. Innovative technology for CPU based attestation and sealing[C] Proc of the 2nd Int Workshop on Hardware and Architectural Support for Security and Privacy. New York: ACM, 2013: 17[39]Liu Y, Fan T, Chen T, et al. Fate: An industrial grade platform for collaborative learning with data protection[J]. Journal of Machine Learning Research, 2021, 22(226): 16[40]Bogdanov D, Laur S, Willemson J. Sharemind: A framework for fast privacypreserving computations[C] Proc of the 13th European Symp on Research in Computer Security. Berlin: Springer, 2008: 192206[41]Keller M. MPSPDZ: A versatile framework for multiparty computation[C] Proc of the 2020 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2020: 15751590[42]沈传年, 徐彦婷, 陈滢霞. 隐私计算关键技术及研究展望[J]. 信息安全研究, 2023, 9(8): 714721 |