共 50 条
- [32] Mobile agent protection based on non-interactive secure function evaluation Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
- [33] A secure non-interactive deniable authentication protocol based on discrete logarithms ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
- [34] InfinityRand: Blockchain Non-Interactive Randomness Beacon Protocol Based on Trapdoor Verifiable Delay Function PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1621 - 1626
- [39] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
- [40] Game-based security proofs for verifiable secret sharing schemes in the standard model INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 163 - 172