共 50 条
- [33] Efficient identity-based signatures secure in the standard model [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 207 - 222
- [35] Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 140 - 159
- [36] Sublinear Secure Computation from New Assumptions [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 121 - 150
- [37] Kleptography from Standard Assumptions and Applications [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 271 - 290
- [38] A Short Paper on Blind Signatures from Knowledge Assumptions [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 535 - 543
- [39] Practical "Signatures with Efficient Protocols" from Simple Assumptions [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 511 - 522
- [40] Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 163 - 195