共 50 条
- [2] Tightly-Secure Signatures from Chameleon Hash Functions PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
- [4] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions Designs, Codes and Cryptography, 2020, 88 : 2433 - 2452
- [5] Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 3 - 22
- [7] Information-Theoretically Secure Entity Authentication in the Multi-user Setting INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
- [8] Secure Multi-User Content Sharing for Augmented Reality Applications PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 141 - 158
- [9] Secure and efficient encrypted keyword search for multi-user setting in cloud computing Peer-to-Peer Networking and Applications, 2019, 12 : 32 - 42