共 62 条
[51]
Hofheinz D, 2014, IACR CRYPTOLOGY EPRI, V2014, P372
[52]
Hofheinz Dennis., 2014, IACR Cryptology ePrint Archive, V2014, P720
[53]
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I,
2015, 9452
:79-102
[54]
Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
[55]
Kiayias A., 2013, CCS
[56]
Micciancio D, 2011, LECT NOTES COMPUT SC, V6841, P465, DOI 10.1007/978-3-642-22792-9_26
[57]
Micciancio D, 2012, LECT NOTES COMPUT SC, V7237, P700, DOI 10.1007/978-3-642-29011-4_41
[58]
Two Round Multiparty Computation via Multi-key FHE
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:735-763
[59]
Multi-key FHE from LWE, Revisited
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II,
2016, 9986
:217-238