共 28 条
- [1] Zhou YW, Yang B, Zhang WZ, Mu Y., CCA2 secure public-key encryption scheme tolerating continual leakage attacks, Security and Communication Networks, 9, 17, pp. 4505-4519, (2016)
- [2] Zhou YW, Yang B., Continuous leakage-resilient public-key encryption scheme with CCA security, The Computer Journal, 60, 8, pp. 1161-1172, (2017)
- [3] Li JG, Teng ML, Zhang YC, Yu QH., A leakage-resilient CCA-secure identity-based encryption scheme, The Computer Journal, 59, 7, pp. 1066-1075, (2016)
- [4] Li JG, Teng ML, Zhang YC., Identity-based broadcast encryption with continuous leakage resilience, Information Sciences, 429, 3, pp. 177-193, (2018)
- [5] Li JG, Guo YY, Yu QH, Lu Y, Zhang YC., Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage, Security and Communication Networks, 9, 10, pp. 1016-1024, (2016)
- [6] Li JG, Yu QH, Zhang YC., Hierarchical attribute-based encryption with continuous leakage resilience, Information Sciences, 484, pp. 113-134, (2019)
- [7] Li JG, Yu QH, Zhang YC., Key-policy attribute-based encryption against continual auxiliary input leakage, Information Sciences, 470, pp. 175-188, (2019)
- [8] Zhou YW, Yang B., Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing, Information Processing Letters, 130, pp. 16-24, (2018)
- [9] Zhou YW, Yang B., Continuous leakage-resilient certificateless public key encryption with CCA security, Knowledge-based Systems, 136, pp. 27-36, (2017)
- [10] Wu JD, Tseng YM, Huang SS., An identity-based authenticated key exchange protocol resilient to continuous key leakage, IEEE Systems Journal, 13, 4, pp. 3968-3979, (2019)