共 16 条
- [1] Rackoff C., Simon D., Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack, Proceedings of the Advances in Cryptology-Crypto 1991, pp. 433-444, (1991)
- [2] Cramer R., Shoup V., A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Proceedings of the Advances in Cryptology-Crypto 1998, pp. 13-25, (1998)
- [3] Cramer R., Shoup V., Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack, SIAM J. Comput., 33, pp. 167-226, (2003)
- [4] Shoup V., Using hash functions as a hedge against chosen ciphertext attack, Proceedings of the Advances in Cryptology-Eurocrypt 2000, pp. 275-288, (2000)
- [5] Kurosawa K., Desmedt Y., A new paradigm of hybrid encryption scheme, Proceedings of the Advances in Cryptology-Crypto 2004, pp. 426-442, (2004)
- [6] Abe M., Gennaro R., Kurosawa K., Shoup V., Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM, Proceedings of the Advances in Cryptology-Eurocrypt 2005, pp. 128-146, (2005)
- [7] Hofheinz D., Kiltz E., Secure hybrid encryption from weakened key encapsulation, Proceedings of the Advances in Cryptology-Crypto 2007, pp. 553-571, (2007)
- [8] Kiltz E., Chosen-ciphertext security from tag-based encryption, Proceedings of the Theory of Cryptography Conference-TCC 2006, pp. 581-600, (2006)
- [9] Boyen X., Mei Q., Waters B., Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 320-329, (2005)
- [10] Cash D., Kiltz E., Shoup V., The twin Diffie-Hellman problem and applications, Proceedings of the Advances in Cryptology-Eurocrypt 2008, pp. 127-145, (2008)