共 50 条
- [1] Secure Software Leasing from Standard Assumptions [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 31 - 61
- [2] Secure Software Leasing [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 501 - 530
- [3] Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 400 - 432
- [5] Concurrently-secure blind signatures without random oracles or setup assumptions [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 323 - +
- [6] Functional Encryption with Secure Key Leasing [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT IV, 2022, 13794 : 569 - 598
- [7] Public Key Encryption with Secure Key Leasing [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 581 - 610
- [8] Assumptions: The Trojan horses of secure protocols [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 34 - 41
- [9] Functional Encryption Enabling Secure Leasing of Private Keys [J]. NTT Technical Review, 2023, 21 (07): : 33 - 37