共 21 条
- [1] Anamorphic Encryption, Revisited [J]. ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024, 2024, 14652 : 3 - 32
- [2] Bellare M., 1993, LECT NOTES COMPUTER, V773, P232, DOI [DOI 10.1007/3-540-48329-2_21, DOI 10.1007/3-540-48329-221]
- [3] Chosen-ciphertext security from identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
- [4] Anamorphic Encryption: New Constructions and Homomorphic Realizations [J]. ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024, 2024, 14652 : 33 - 62
- [5] De Santis A., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P566
- [6] FEIGE U, 1990, ANN IEEE SYMP FOUND, P308
- [7] Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3 [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2901 - 2914
- [8] Fujisaki E., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P260
- [9] Fujisaki E, 1999, LECT NOTES COMPUT SC, V1560, P53
- [10] HPRV19 Horel T., 2019, ITCS 2019, V124