共 30 条
[1]
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:332-352
[2]
Abdalla M, 2009, LECT NOTES COMPUT SC, V5677, P671, DOI 10.1007/978-3-642-03356-8_39
[3]
[Anonymous], 45 ACM STOC
[4]
[Anonymous], 2017997 CRYPT EPRINT
[6]
Ben Hamouda F, 2013, LECT NOTES COMPUT SC, V7778, P272, DOI 10.1007/978-3-642-36362-7_18
[7]
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:107-129
[8]
Benhamouda F, 2013, LECT NOTES COMPUT SC, V8042, P449, DOI 10.1007/978-3-642-40041-4_25
[9]
Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8
[10]
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523