共 25 条
[1]
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:332-352
[2]
[Anonymous], 1991, INPROC 11 ANN INT CR, DOI [10.1007/3-540-46766-1_9, DOI 10.1007/3-540-46766-1_9, DOI 10.1007/3--540-46766-1_9]
[3]
Universally composable protocols with relaxed set-up assumptions
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:186-195
[4]
Belenkiy M, 2008, LECT NOTES COMPUT SC, V4948, P356, DOI 10.1007/978-3-540-78524-8_20
[5]
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:287-304
[6]
Blazy O., 2013, Lecture Notes in Computer Science, V7954, P534
[7]
Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
[8]
Camenisch J, 2003, LECT NOTES COMPUT SC, V2729, P126
[9]
Canetti R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P19
[10]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145