共 50 条
- [2] Constructions of CCA-Secure Revocable Identity-Based Encryption [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
- [3] Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction [J]. COMPUTER JOURNAL, 2016, 59 (04): : 508 - 521
- [5] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
- [6] Efficient CCA-Secure PKE from Identity-Based Techniques [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
- [7] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness [J]. Designs, Codes and Cryptography, 2018, 86 : 517 - 554
- [9] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud [J]. IEEE ACCESS, 2018, 6 : 56977 - 56983
- [10] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075