共 18 条
[1]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[2]
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15
[3]
Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29
[6]
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits (Extended Abstract)
[J].
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS),
2013,
:40-49
[7]
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[8]
Gentry C., 2014, 2014148 CRYPT EPRINT
[9]
Goldreich O., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P464, DOI 10.1109/SFCS.1984.715949
[10]
Goldwasser S, 2014, LECT NOTES COMPUT SC, V8441, P578, DOI 10.1007/978-3-642-55220-5_32