共 50 条
- [33] Identity-Based Encryption Resilient to Continual Auxiliary Leakage ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
- [34] Parallel key-insulated signature scheme without random oracles 1600, Korean Institute of Communications and Information Sciences (15):
- [35] Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 501 - 510
- [36] Public Immunization Against Complete Subversion Without Random Oracles APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 465 - 485
- [37] Public key searchable encryption without random oracle Zhang, X. (zxf071714229@hotmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
- [38] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
- [39] Efficient leakage-resilient public key encryption from DDH assumption Cluster Computing, 2013, 16 : 797 - 806