共 12 条
- [1] [Anonymous], 2012, ASIACCS
- [2] Ateniese G, 2011, LECT NOTES COMPUT SC, V6571, P156, DOI 10.1007/978-3-642-19379-8_10
- [4] Camenisch J, 2009, LECT NOTES COMPUT SC, V5628, P108, DOI 10.1007/978-3-642-03549-4_7
- [5] De Cristofaro E, 2012, INT C CRYPT NETW SEC, V7712, P218
- [6] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
- [7] Dong C, 2013, P 2013 ACM SIGSAC C, P789
- [8] Goldreich O., 2009, Foundations of Cryptography, Basic Applications, V2
- [9] PROBABILISTIC ENCRYPTION [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) : 270 - 299
- [10] Hazay C., 2015, 20154 IACR CRYPT EPR, V2015, P4