共 50 条
- [41] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness Designs, Codes and Cryptography, 2018, 86 : 517 - 554
- [43] A general construction of IND-CCA2 secure public key encryption CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 152 - 166
- [45] A Multi-use CCA-secure Proxy Re-encryption Scheme 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 39 - +
- [46] Verifiability-based conversion from CPA to CCA-secure predicate encryption Applicable Algebra in Engineering, Communication and Computing, 2018, 29 : 77 - 102
- [49] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions Designs, Codes and Cryptography, 2020, 88 : 2433 - 2452