共 24 条
- [2] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
- [4] Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 818 - 832
- [5] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
- [7] Practical continuous leakage-resilient CCA secure identity-based encryption [J]. Frontiers of Computer Science, 2020, 14
- [9] Leakage-resilient identity-based cryptography from minimal assumptions [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
- [10] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273