参考文献
[1] Bellare M, Boldyreva A, O’Neill A. Deterministic and Effic- iently Searchable Encryption[C]//Proceedings of Crypto’07. Santa Barbara, USA: Springer, 2007: 535-552.
[2] Goldwasser S, Micali S. Probabilistic Encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
(下转第122页)
(上接第119页)
[3] Bellare M, Fischlin M, O’Neill A, et al. Deterministic Encryp- tion: Definitional Equivalences and Constructions Without Random Oracles[C]//Proceedings of Crypto’08. Santa Barbara, USA: Springer, 2008: 360-378.
[4] Boldyreva A, Fehr S, O’Neill A. On Notions of Security for Deterministic Encryption and Efficient Constructions Without Random Oracles[C]//Proceedings of Crypto’08. Santa Barbara, USA: Springer, 2008: 335-359.
[5] Fuller B, O’Neill A, Reyzin L. A Unified Approach to Deter- ministic Encryption: New Constructions and a Connection to Computational Entropy[C]//Proceedings of TCC’12. Taormina, Italy: Springer, 2012: 582-599.
[6] Mironov I, Pandey O, Reingold O, et al. Incremental Deter- ministic Public-key Encryption[C]//Proceedings of Eurocrypt’12. Cambridge, UK: Springer, 2012: 628-644.
[7] 陈 浩, 朱艳琴, 罗喜召. 改进的抗自适应泄漏公钥加密方案[J]. 计算机工程, 2012, 38(15): 108-110.
[8] 张明武, 杨 波, Tsuyoshi T. 抗主密钥泄露和连续泄露的双态仿射函数加密[J]. 计算机学报, 2012, 35(9): 1856-1867.
[9] Brakerski Z, Segev G. Better Security for Deterministic Public-key Encryption: The Auxiliary-input Setting[C]// Proceedings of Crypto’11. Santa Barbara, USA: Springer, 2011: 543-560.
[10] Wee H. Dual Projective Hashing and Its Applications——Lossy Trapdoor Functions and More[C]//Proceedings of Eurocrypt’12. Cambridge, UK: Springer, 2012: 246-262.
[11] Cramer R, Damgard I, Kiltz E, et al. DDH-like Assumptions Based on Extension Rings[C]//Proceedings of PKC’12. Darmstadt, Germany: Springer, 2012: 644-661.
[12] Boneh D, Halevi S, Hamburg M, et al. Circular-secure Encryption from Decision Diffie-Hellman[C]//Proceedings of Crypto’08. Santa Barbara, USA: Springer, 2008: 108-125.
[13] Dodis Y, Goldwasser S, Kalai Y T, et al. Public Key Encry- ption Schemes with Auxiliary Inputs[C]//Proceedings of TCC’10. Zurich, Switzerland: Springer, 2010: 361-381.
编辑 金胡考 |