共 17 条
- [1] Attribute-based signature and its applications. Li J,LMan H A. Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security . 2010
- [2] Trapdoors for hard lattices and new cryptographic constructions. Gentry C,Peikert C,Vaikuntanathan V. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, (STOC’’08) . 2008
- [3] Efficient attribute-based signatures for non-monotone predicates in the standard model. Okamoto T,Takashima K. Proceedings of Public Key Cryptography (PKC 2011) . 2011
- [4] Attribute-based functional encryption on lattices. Boyen X. Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography . 2013
- [5] A lattice-based threshold ring signature scheme. Cayrel P L,Lindner R,R¨uckert M,et al. Progress in Cryptology—LATINCRYPT 2010 . 2010
- [6] Lattice-based blind signatures. R¨uckert M. Proceedings of Advances in Cryptology (ASIACRYPT2010) . 2010
- [7] Decentralized attributeBased signatures. Okamoto T,Takashima K. Proceedings of Public-Key Cryptography (PKC 2013) . 2013
- [8] Bonsai Trees,or How to Delegate a Lattice Basis. D.Cash,et al. Advances in Cryptology Eurocrypt2010 . 2010
- [9] On lattices, learning with errors, random linear codes, and cryptography. Regev,O. Pro-ceedings of the thirty-seventh annual ACM symposium on Theory of computing, STOC 2005 . 2005
- [10] Generating hard instances of lattice problems (extended abstract). M.AJTAI. STOC’’96: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing . 1996