共 50 条
- [22] Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation Algorithmica, 2019, 81 : 3245 - 3390
- [23] Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 349 - 356
- [25] Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge Designs, Codes and Cryptography, 2019, 87 : 1373 - 1413
- [27] Adaptively Secure Constrained Pseudorandom Functions in the Standard Model ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 559 - 589
- [28] Public-Key Watermarking Schemes for Pseudorandom Functions ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 637 - 667
- [29] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
- [30] Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 77 - 94