共 24 条
- [1] Chen RM, 2017, DESIGN CODE CRYPTOGR, V85, P145, DOI 10.1007/s10623-016-0295-3
- [2] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
- [3] Cryptography Against Continuous Memory Attacks [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 511 - 520
- [4] Decentralized Attribute-Based Server-Aid Signature in the Internet of Things [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06): : 4573 - 4583
- [5] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme [J]. COMPUTER JOURNAL, 2016, 59 (07) : 1066 - 1075
- [6] Efficient leakage-resilient public key encryption from DDH assumption [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
- [8] Naor M, 2009, LECT NOTES COMPUT SC, V5677, P18, DOI 10.1007/978-3-642-03356-8_2
- [9] Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4719 - 4730
- [10] Qiao ZR, 2022, IEEE SYST J, V16, P1842, DOI [10.1109/JSYST.2020.3046450, 10.1145/3473141.3473219]