共 42 条
- [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
- [2] Bellare M., 2009, Report 2009/101
- [3] Bellare M., 2013, LNCS, V8257, P218, DOI [10.1007/978-3-319-02937-5_12, DOI 10.1007/978-3-319-02937-5_12]
- [4] Bellare M, 2012, LECT NOTES COMPUT SC, V7237, P645, DOI 10.1007/978-3-642-29011-4_38
- [5] Bellare M, 2011, LECT NOTES COMPUT SC, V6597, P235, DOI 10.1007/978-3-642-19571-6_15
- [6] Bellare M, 2009, LECT NOTES COMPUT SC, V5479, P1, DOI 10.1007/978-3-642-01001-9_1
- [7] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [8] All-But-Many Lossy Trapdoor Functions from Lattices and Applications [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 298 - 331
- [9] Fehr S, 2010, LECT NOTES COMPUT SC, V6110, P381
- [10] Fujisaki E., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P537