共 56 条
[51]
Okamoto T, 2009, LECT NOTES COMPUT SC, V5912, P214, DOI 10.1007/978-3-642-10366-7_13
[52]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[53]
Sahai A., 2008, COMMUNICATION
[54]
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
[J].
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2014,
:475-484
[55]
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2009,
2009, 5677
:619-636
[56]
How to Obfuscate Programs Directly
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:439-467