共 16 条
- [1] CHOW S S M, LIU J K, ZHOU J Y., Identity-based online/ offline key encapsulation and encryption, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 52-60, (2011)
- [2] LYU L, LIU S L, GU D W., Structure-preserving public-key encryption with leakage-resilient CCA security, Theoretical Computer Science, 795, pp. 57-80, (2019)
- [3] LI J G, YU Q H, ZHANG Y C., Identity-based broadcast encryption with continuous leakage resilience, Informa⁃ tion Sciences, 429, pp. 177-193, (2018)
- [4] LI J G, YU Q H, ZHANG Y C., Key-policy attribute-based encryption against continual auxiliary input leakage, In⁃ formation Sciences, 470, pp. 175-188, (2019)
- [5] ZHOU Y W, YANG B., Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilin⁃ ear pairing, Information Processing Letters, 130, pp. 16-24, (2018)
- [6] ZHOU Y W, YANG B., Continuous leakage-resilient certif⁃ icateless public key encryption with CCA security, Knowledge-Based Systems, 136, pp. 27-36, (2017)
- [7] LU Y, LI J G., A pairing-free certificate-based proxy re-en⁃ cryption scheme for secure data sharing in public clouds, Future Generation Computer Systems, 62, pp. 140-147, (2016)
- [8] LU Y, LI J G., A provably secure certificate-based encryp⁃ tion scheme against malicious CA attacks in the standard model, Information Sciences, 372, pp. 745-757, (2016)
- [9] GUO Y Y, LI J G, LU Y, Et al., Provably secure certificate-based encryption with leakage resilience, Theoretical Computer Science, 711, pp. 1-10, (2018)
- [10] ZHOU Y W, YANG B, WANG T, Et al., Continuous leak⁃ age-resilient certificate-based encryption scheme without bilinear pairings, The Computer Journal, 63, 4, pp. 508-524, (2020)