[1]Paillier P. Publickey cryptosystems based on composite degree residuosity classes[C] Proc of the Int Conf on the Theory and Application of Cryptographic Techniques, Berlin: Springer, 1999: 223238[2]Boneh D, Goh E J, Nissim K. Evaluating 2DNF formulas on ciphertexts[G] LNCS 3378: Proc of the 2005 Theory of Cryptography Conference. Berlin: Springer, 2005: 325341[3]Gentry C. Fully homomorphic encryption using ideal lattices[C] Proc of the 41st annual ACM Symp on Theory of Computing. New York: ACM, 2009: 169178[4]Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrap[J]. ACM Trans on Computation Theory (TOCT), 2014, 6(3): 136[5]Brakerski Z. Fully homomorphic encryption without modulus switching from classical GapSVP[C] Proc of the Annual Cryptology Conference. Berlin: Springer, 2012: 868886[6]Cheon J H, Kim A, Kim M, et al. Homomorphic encryption for arithmetic of approximate numbers[C] Proc of the Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2017: 409437[7]Jin X, Zhang H, Li X, et al. Confusedmoduloprojectionbased somewhat homomorphic encryption—Cryptosystem, library, and applications on secure smart cities[J]. IEEE Internet of Things Journal, 2020, 8(8): 63246336[8]Li X, Gao H, Zhang J, et al. GPU accelerated full homomorphic encryption cryptosystem, library, and applications for IoT systems[J]. IEEE Internet of Things Journal, 2023, 11(4): 68936903