共 62 条
[21]
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I,
2014, 8616
:480-499
[22]
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[23]
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15
[24]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[25]
Function Secret Sharing
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:337-367
[26]
Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29
[27]
Brakerski Z., 2014, ITCS
[28]
Targeted Homomorphic Attribute-Based Encryption
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II,
2016, 9986
:330-360
[29]
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:190-213
[30]
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
[J].
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III,
2016, 9816
:363-384