Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Bellare, M., Fuchsbauer, G.: Policy-based signatures. Cryptology ePrint Archive, Report 2013/413 (2013)
2. Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: ACM Conference on Computer and Communications Security, pp. 784–796 (2012)
3. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
4. Lecture Notes in Computer Science;D. Boneh,2004
5. Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586-615 (2001)
Cited by
267 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Ad Hoc Broadcast, Trace, and Revoke;IACR Communications in Cryptology;2024-07-08
2. Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation;Proceedings of the 56th Annual ACM Symposium on Theory of Computing;2024-06-10
3. Periscoping: Private Key Distribution for Large-Scale Mixnets;IEEE INFOCOM 2024 - IEEE Conference on Computer Communications;2024-05-20
4. Holepunch: Fast, Secure File Deletion with Crash Consistency;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. Watermarking PRFs and PKE Against Quantum Adversaries;Journal of Cryptology;2024-04-26