共 50 条
- [41] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
- [42] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
- [43] Practical continuous leakage-resilient CCA secure identity-based encryption Frontiers of Computer Science, 2020, 14
- [44] Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 281 - 292
- [46] Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings COMPUTER JOURNAL, 2020, 63 (04): : 508 - 524
- [47] Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service APPLIED SCIENCES-BASEL, 2022, 12 (22):
- [48] Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 44 - 61
- [49] Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 42 - 53
- [50] TEDT2-Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021, 2021, 12912 : 275 - 295