共 57 条
- [1] Generating Shorter Bases for Hard Random Lattices [J]. THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) : 535 - 553
- [2] [Anonymous], 2019, INT J NETW SECUR
- [3] [Anonymous], 2010, THESIS
- [4] Aono Yoshinori, 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P1, DOI 10.1007/978-3-319-03515-4_1
- [5] Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
- [6] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [7] Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
- [8] Banerjee A., 2013, J INTERNET SERVICES, V3, P38
- [10] Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):