共 50 条
[1]
Agrawal S, 2013, LECT NOTES COMPUT SC, V8043, P500, DOI 10.1007/978-3-642-40084-1_28
[2]
Ananth P., 2015, Paper 2015/730
[3]
Functional Encryption for Turing Machines
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I,
2016, 9562
:125-153
[4]
From Selective to Adaptive Security in Functional Encryption
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:657-677
[5]
Indistinguishability Obfuscation from Compact Functional Encryption
[J].
ADVANCES IN CRYPTOLOGY, PT I,
2015, 9215
:308-326
[6]
[Anonymous], IACR CRYPTOLOGY EPRI
[7]
[Anonymous], IACR CRYPTOLOGY EPRI
[8]
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
[J].
2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2015,
:191-209
[9]
Multi-input Functional Encryption for Unbounded Arity Functions
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I,
2015, 9452
:27-51
[10]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1