共 50 条
- [31] Assumptions: The Trojan horses of secure protocols [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 34 - 41
- [32] Weakly Secure Equivalence-Class Signatures from Standard Assumptions [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 153 - 183
- [33] Compact IBBE and Fuzzy IBE from Simple Assumptions [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 563 - 582
- [34] A simple derivation of the quantum state from two assumptions [J]. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2018, 474 (2218):
- [35] Efficient and practical fair exchange protocols with off-line TTP [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 77 - 85
- [36] Structure-Preserving Signatures on Equivalence Classes from Standard Assumptions [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 63 - 93
- [37] On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 74 - 104
- [38] Dual Form Signatures: An Approach for Proving Security from Static Assumptions [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 25 - 42
- [40] Signatures with Tight Multi-user Security from Search Assumptions [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 485 - 504