共 50 条
- [3] Multi-recipient Public-Key Encryption from Simulators in Security Proofs INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
- [4] Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 105 - 126
- [5] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
- [6] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT Cluster Computing, 2022, 25 : 2305 - 2316
- [7] Public Key Encryption with Delegated Equality Test in a Multi-User Setting COMPUTER JOURNAL, 2015, 58 (04): : 986 - 1002
- [8] Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting IEEE ACCESS, 2018, 6 : 42445 - 42453
- [10] On the security of hybrid public-key encryption ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33