神化怪物 发表于 2025-3-28 17:40:58
http://reply.papertrans.cn/47/4654/465322/465322_41.pngCHYME 发表于 2025-3-28 22:14:39
Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Schemeeling and parameter hiding properties of composite order settings. The security of our scheme is based on the subspace assumption, which can be reduced to the decisional linear assumption. We employ the dual system encryption technique in our security proof.继承人 发表于 2025-3-29 01:38:57
http://reply.papertrans.cn/47/4654/465322/465322_43.png树胶 发表于 2025-3-29 06:31:33
0302-9743 ography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks..978-3-642-38032-7978-3-642-38033-4Series ISSN 0302-9743 Series E-ISSN 1611-3349执 发表于 2025-3-29 09:02:18
http://reply.papertrans.cn/47/4654/465322/465322_45.pngVo2-Max 发表于 2025-3-29 13:45:13
http://reply.papertrans.cn/47/4654/465322/465322_46.pngTruculent 发表于 2025-3-29 15:56:51
Conference proceedings 2013d in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks..invulnerable 发表于 2025-3-29 22:14:19
http://reply.papertrans.cn/47/4654/465322/465322_48.png反省 发表于 2025-3-30 03:55:59
http://reply.papertrans.cn/47/4654/465322/465322_49.pngIST 发表于 2025-3-30 04:41:25
http://reply.papertrans.cn/47/4654/465322/465322_50.png