共 40 条
- [21] Non-interactive Security Framework for Mobile Device based Academic Monitoring System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 265 - 276
- [22] A discrete-logarithm based non-interactive non-malleable commitment scheme with an online knowledge extractor INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 153 - 166
- [25] On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes 2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, STUDENT 2012 - Conference Booklet, 2012, : 207 - 212
- [26] On the Security of Pairing-Based Non-Interactive Designated Verifier Proofs of Undeniable Signature Schemes 2012 IEEE CONFERENCE ON SUSTAINABLE UTILIZATION AND DEVELOPMENT IN ENGINEERING AND TECHNOLOGY (STUDENT), 2012, : 207 - 212
- [27] Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2009, 25 (03): : 352 - 357
- [28] A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 403 - 430
- [29] ID-based cryptographic schemes using a non-interactive public-key distribution system 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243
- [30] Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 75 - 93