HU Jian, ZHANG Lintao, CHAI Hua, ZHENG Liang, HE Chengfei. Exploration of privacy-preserving computation combined with supercomputing[J]. Information and Communications Technology and Policy, 2023, 49(6): 79-83.
MCMAHAN B, MOORE E, RAMAGE D, et al. Communication-efficient learning of deep networks from decentralized data[C]//Artificial Intelligence and Statistics. PMLR, 2017: 1273-1282.
[2]
SABT M, ACHEMLAL M, BOUABDALLAH A. Trusted execution environment: what it is, and what it is not[C]//2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015(1): 57-64.
[3]
RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978, 4(11): 169-180.
[4]
GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. ACM, 2009: 169-178.