共 25 条
[1]
From Single-Input to Multi-client Inner-Product Functional Encryption
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III,
2019, 11923
:552-582
[2]
Abdalla M, 2019, LECT NOTES COMPUT SC, V11443, P128, DOI 10.1007/978-3-030-17259-6_5
[3]
Non-Interactive Zero-Knowledge Proofs for Composite Statements
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III,
2018, 10993
:643-673
[4]
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
[J].
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III,
2016, 9816
:333-362
[5]
Verifiable Functional Encryption
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II,
2016, 10032
:557-587
[6]
Bell J., 2022, Report 2022/1461
[7]
Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
[8]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[9]
Bulletproofs: Short Proofs for Confidential Transactions and More
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:315-334
[10]
Castagnos Guilhem, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P487, DOI 10.1007/978-3-319-16715-2_26