共 50 条
- [2] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
- [4] Practical continuous leakage-resilient CCA secure identity-based encryption [J]. Frontiers of Computer Science, 2020, 14
- [5] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
- [6] Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption [J]. COMPUTER JOURNAL, 2023, 66 (04): : 924 - 940
- [8] Continuous leakage-resilient identity-based encryption with leakage amplification [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
- [10] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172