共 21 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2020,
2020, 12248
:41-61
[4]
[Anonymous], 1985, P WORKSH THEOR APPL
[5]
Baum Carsten, 2018, Information and Communications Security. 20th International Conference, ICICS 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11149), P303, DOI 10.1007/978-3-030-01950-1_18
[7]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]
Haase P., 2005, EPRI J., V27, P32
[9]
Jian Li, 2009, 2009 International Symposium on Autonomous Decentralized Systems (ISADS), DOI 10.1109/ISADS.2009.5207389
[10]
Katz JS, 2008, 2008 IEEE ENERGY 2030 CONFERENCE, P70