共 50 条
- [31] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
- [32] Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 42 - 53
- [33] Efficient CCA-Secure PKE from Identity-Based Techniques [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
- [35] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 1 - +
- [39] Leakage-resilient identity-based cryptography from minimal assumptions [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801