共 25 条
[1]
Simple Functional Encryption Schemes for Inner Products
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:733-751
[2]
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[3]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[5]
Apon Daniel., 2015, IACR CRYPTOL, V2015, P993
[6]
Bendlin R, 2011, LECT NOTES COMPUT SC, V7073, P125, DOI 10.1007/978-3-642-25385-0_7
[7]
Bo Meng, 2010, Journal of Networks, V5, P683, DOI 10.4304/jnw.5.6.683-690
[8]
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:353-367
[9]
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P90
[10]
Fully Deniable Interactive Encryption
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I,
2020, 12170
:807-835