共 50 条
- [31] On the Power of Public-Key Encryption in Secure Computation [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
- [32] Tightly secure signatures and public-key encryption [J]. Designs, Codes and Cryptography, 2016, 80 : 29 - 61
- [33] Tightly Secure Signatures and Public-Key Encryption [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 590 - 607
- [35] Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 381 - 400
- [37] An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 359 - 373
- [38] Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 307 - 338
- [39] Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 93 - 110
- [40] Efficient Chosen-Ciphertext Secure Encryption from R-LWE [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988