共 50 条
- [41] Simple Construction of PEKS from LWE-Based IBE in the Standard Model PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT I, 2025, 14903 : 168 - 186
- [42] Implementing Private K-Means Clustering Using a LWE-based Cryptosystem 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 88 - 93
- [43] Identity-Based Encryption from LWE with More Compact Master Public Key TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 319 - 353
- [44] Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 355 - 358
- [46] Public Key Authenticated Encryption with Keyword Search from LWE COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
- [47] Non-interactive verifiable LWE-based multi secret sharing scheme Multimedia Tools and Applications, 2023, 82 : 22175 - 22187
- [49] LWE-Based Single-Server Block Private Information Retrieval Protocol SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 469 - 480
- [50] Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 192 - 210