共 53 条
[1]
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[2]
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[3]
[Anonymous], 1990, FOCS 1990
[4]
Computationally private randomizing polynomials and their applications
[J].
TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS,
2005,
:260-274
[5]
Cryptography in NC0
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:166-175
[6]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[7]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[8]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[9]
Bellare M., 2012, ACM CCS 2012, P784, DOI [DOI 10.1145/2382196.2382279, 10.1145/2382196.2382279.]
[10]
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:308-331