References
- Abadi , M. , Feigenbaum , J. and Kilian , J. 1989 . On hiding information from an oracle . Journal of Computer and System Sciences , 39 : 21 – 50 .
- Ahituv , N. , Lapid , Y. and Neumann , S. 1987 . Processing Encrypted Data . Communications of the ACM , 30 ( 9 ) September : 777 – 780 .
- Brickell E. F. Yacobi Y. On privacy homomorphisms April 1987 13 15 Eurocrypt87 Abstract, Amsterdam
- Denning , D. E. 1982 . Cryptography and Data Security , Reading, , Massachusetts : Addison-Wesley . 1982
- Rabin M. O. Digitalized Signatures and Public Key Functions as Intractable as Factorization January 1979 MIT/LCS/TR-212
- Rivest , R. L. , Adleman , L. and Dertouzos , M. L. 1978 . “ On data banks and privacy homomorphisms ” . In Foundation of Secure Computations , New York : Academic .
- Rosen , K. H. 1988 . Elementary Number Theory and Its Applications , Reading, , Massachusetts : Addison-Wesley .
- Wu , T. C. , Yeh , Y. S. and Chang , C. C. 1993 . Algebraic operations on encrypted relational databases . Information Systems , 18 ( 1 ) : 55 – 62 .