共 32 条
[1]
Ananth P., 2015, 2015776 CRYPT EPRINT
[2]
From Selective to Adaptive Security in Functional Encryption
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:657-677
[3]
Computationally private randomizing polynomials and their applications
[J].
TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS,
2005,
:260-274
[4]
Cryptography in NC0
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:166-175
[5]
Applebaum B, 2014, LECT NOTES COMPUT SC, V8874, P162, DOI 10.1007/978-3-662-45608-8_9
[6]
Applebaum B, 2013, LECT NOTES COMPUT SC, V8043, P166, DOI 10.1007/978-3-642-40084-1_10
[7]
Applebaum B, 2011, LECT NOTES COMPUT SC, V6632, P527, DOI 10.1007/978-3-642-20465-4_29
[8]
Applebaum B, 2010, LECT NOTES COMPUT SC, V6198, P152, DOI 10.1007/978-3-642-14165-2_14
[9]
Barak B, 2010, LECT NOTES COMPUT SC, V6110, P423
[10]
Bellare M., 2012, ACM CCS 2012, P784, DOI [DOI 10.1145/2382196.2382279, 10.1145/2382196.2382279.]