共 50 条
- [23] Protecting against key-exposure: strongly key-insulated encryption with optimal threshold Applicable Algebra in Engineering, Communication and Computing, 2006, 16 : 379 - 396
- [24] Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 277 - 283
- [25] Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 376 - 379
- [27] A survey of key-insulated cryptography Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (04): : 759 - 774
- [29] Identity-based parallel key-insulated encryption without random oracles: Security notions and construction PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 409 - +
- [30] Parallel key-insulated signature scheme without random oracles 1600, Korean Institute of Communications and Information Sciences (15):