共 39 条
[1]
Abdalla M., 2016, Paper 2016/011, V2016
[2]
Abdalla M, 2019, LECT NOTES COMPUT SC, V11443, P128, DOI 10.1007/978-3-030-17259-6_5
[3]
Simple Functional Encryption Schemes for Inner Products
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:733-751
[4]
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
[J].
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III,
2016, 9816
:333-362
[5]
Alderman J., 2015, P 10 ACM S INF COMP, P657
[6]
Hybrid Publicly Verifiable Computation
[J].
TOPICS IN CRYPTOLOGY - CT-RSA 2016,
2016, 9610
:147-163
[7]
Barbosa Manuel, 2019, Topics in Cryptology - CT-RSA 2019. The Cryptographers Track at the RSA Conference 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11405), P127, DOI 10.1007/978-3-030-12612-4_7
[8]
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[9]
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II,
2017, 10175
:36-66
[10]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16