共 23 条
[1]
Gentry C., Silverberg A., Hierarchical id-based cryptography, advances in cryptology, ASIACRYPT 2002, pp. 548-566, (2002)
[2]
Horwitz J., Lynn B., Toward hierarchical identity-based encryption, pp. 466-481, (2002)
[3]
Boneh D., Franklin M., Identity-based encryption from theweil pairing, Advances in Cryptology CRYPTO 2001, pp. 213-229, (2001)
[4]
Lai J., Deng R.H., Liu S., Et al., Identity-based encryption secure against selective opening chosen-ciphertextattack, Advances in Cryptology EUROCRYPT 2012, pp. 77-92, (2012)
[5]
Yamada S., Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters, Advances in Cryptology EUROCRYPT2016, pp. 32-62, (2016)
[6]
Wang F.H., Liu Z.H., Wang C.X., Full secure identity-based encryption scheme with short public key size over lattices in the standard model, The International Journal of Computer Mathematics, 93, 6, pp. 854-863, (2016)
[7]
Regev O., On lattices, learning with errors, random linear codes, and cryptography, The Annual ACM Symposium on Theory of Computing, 56, 6, pp. 84-93, (2009)
[8]
Nguyen P., Zhang J., Zhang Z.F., Simpler efficient group signatures from lattices, Public-Key Cryptography, pp. 401-426, (2015)
[9]
Brakerski Z., Perlman R., Lattice-based fully dynamic multi-key FHE with short ciphertexts, CRYPTO2016, pp. 190-213, (2016)
[10]
Libert B., Ling S., Nguyen K., Et al., Zero-knowledge arguments for lattice-based accumulators, logarithmic-size ring signatures and group signatures without trapdoors, Advances in Cryptology EUROCRYPT 2016, pp. 1-31, (2016)