Author:
Yi Xun,Paulet Russell,Bertino Elisa
Publisher
Springer International Publishing
Reference12 articles.
1. M. Abdalla, M. Bellare, P. Rogaway, DHAES: an encryption scheme based on the Diffie–Hellman problem. Submission to IEEE P1363a, 1998.
http://www.di.ens.fr/~mabdalla/papers/dhes.pdf
2. D. Boneh, E. Goh, K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in Proceedings of Theory of Cryptography, TCC’05, 2005, pp. 325–341
3. R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in Proceedings of Advances in Cryptology, CRYPTO’98, 1998, pp. 13–25
4. T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
5. D.M. Freeman, Converting pairing-based cryptosystems from composite-order groups to prime-order groups, in Proceedings of Advances in Cryptology, EUROCRYPT’10, 2010, pp. 44–61
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献