共 19 条
[1]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]
[Anonymous], 1985, P WORKSH THEOR APPL
[3]
Tightly-Secure Signatures from Chameleon Hash Functions
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:256-279
[4]
Random Oracles in a Quantum World
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011,
2011, 7073
:41-+
[5]
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II,
2016, 10032
:404-434
[7]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II,
2018, 10992
:95-125
[9]
Grover L. K., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P212, DOI 10.1145/237814.237866
[10]
Katsumata S, 2018, LECT NOTES COMPUT SC, V11273, P253, DOI 10.1007/978-3-030-03329-3_9