共 50 条
- [21] On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 129 - 158
- [22] Robust key-evolving public key encryption schemes INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 61 - 72
- [24] New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 3 - 31
- [25] Online encryption schemes: New security notions and constructions TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 1 - 14
- [26] Deducing trapdoor primitives in public key encryption schemes DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 81 - 91
- [27] Public-Key Encryption Schemes with Auxiliary Inputs THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +
- [28] On the security notions for public-key encryption schemes SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
- [30] Building Key-Private Public-Key Encryption Schemes INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 276 - 292