共 81 条
- [1] Abdalla M., 2007, P PUBL KEY CRYPT PKC
- [2] Efficient Public Trace and Revoke from Standard Assumptions [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2277 - 2293
- [3] Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 333 - 362
- [4] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
- [5] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
- [6] [Anonymous], 1994, LNCS
- [7] [Anonymous], 2006, EUROCRYPT
- [8] Apon D., 2016, 20161003 CRYPT EPRIN
- [9] Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
- [10] Asharov Gilad., 2011, Report 2011/613, P613