共 27 条
- [1] Afshar A., 2014, 2014759 CRYPT EPRINT
- [2] [Anonymous], LNCS
- [3] [Anonymous], 1987, 19 ACM STOC, DOI DOI 10.1145/28395.28420
- [4] Beaver D., 1997, 29 ACM STOC, P446, DOI DOI 10.1145/258533.258637
- [5] Bellare M, 2012, LECT NOTES COMPUT SC, V7658, P134, DOI 10.1007/978-3-642-34961-4_10
- [6] Fully, (Almost) Tightly Secure IBE and Dual System Groups [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 435 - 460
- [7] Chung K.M., 2013, SIMPLE ORAM TECHNICA
- [8] Gentry C, 2014, LECT NOTES COMPUT SC, V8441, P405, DOI 10.1007/978-3-642-55220-5_23
- [9] Software protection and simulation on oblivious RAMs [J]. JOURNAL OF THE ACM, 1996, 43 (03) : 431 - 473
- [10] Huang Y, 2014, LECT NOTES COMPUT SC, V8617, P458, DOI 10.1007/978-3-662-44381-1_26