Research Journal of Applied Sciences
Year:
2016
Volume:
11
Issue:
10
Page No.
1050 - 1053
References
Apostol, T.M., 1974. Mathematical Analysis. 2nd Edn., Wesley, Addison, Texas, .
Apostol, T.M., 1976. Introduction to Analytic Number Theory, Undergraduate Texts in Mathematics. Springer-Verlag, New York-Heidelberg.
Brakerski, Z. and G. Segev, 2015. Function-Private Functional Encryption in the Private-Key Setting. In: Theory of Cryptography, Yevgeniy, D. and J.B. Nielsen (Eds.). Springer, Berlin, Germany, ISBN:978-3-662-46496-0, pp: 306-324.
Duan, Y., 2014. Distributed key generation for encrypted deduplication: Achieving the strongest privacy. Proceedings of the 6th ACM Workshop on Cloud Computing Security, November 3-7, 2014, ACM, Scottsdale, Arizona, ISBN:978-1-4503-3239-2, pp: 57-68.
Galbraith, S.D., 2012. Mathematics of Public Key Cryptography. Cambridge University Press, Cambridge, England, UK., ISBN:978-1-107-01392-6, Pages: 616.
Qin, B. and S. Liu, 2014. Leakage-flexible CCA-secure public-key encryption: Simple construction and free of pairing. Proceedings of the International Workshop on Public Key Cryptography, March 26-28, 2014, Springer, Berlin, Germany, ISBN:978-3-642-54630-3, pp: 19-36.
Qin, B., S. Liu, K. Chen and M. Charlemagne, 2013. Leakage-resilient lossy trapdoor functions and public-key encryption. Proceedings of the first ACM Workshop on Asia Public-Key Cryptography, May 8-10, 2013, ACM, Hangzhou, China, ISBN:978-1-4503-2069-6, pp: 3-12.
Salomaa, A., 2013. Public-Key Cryptography. 2nd Edn., Springer, Berlin, Germany, ISBN:978-3-662-03269-5, Pages: 274.
Van-Dijk, M., C. Gentry, S. Halevi and V. Vaikuntanathan, 2010. Fully Homomorphic Encryption Over the Integers. In: Lecture Notes in Computer Science, Rabin, T. (Ed.). Springer Verlag, France, PP: 24-43.