共 20 条
[1]
[Anonymous], 2015048 CRYPT EPRINT
[2]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[3]
Barak B., 2013, 2013631 IACR CRYPT E, V2013, P631
[4]
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[5]
Bitansky N, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P241
[6]
Brakerski Z, 2014, LECT NOTES COMPUT SC, V8349, P1, DOI 10.1007/978-3-642-54242-8_1
[8]
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[9]
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits (Extended Abstract)
[J].
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS),
2013,
:40-49
[10]
Garg S, 2013, LECT NOTES COMPUT SC, V7881, P1, DOI 10.1007/978-3-642-38348-9_1