[1] |
张晔,尚进,蒋东毅. 云数据中心网络安全服务架构的研究与实践[J]. 信息网络安全,2016(9):98-103.
|
[2] |
BARAK B, GOLDREICH O, IMPAGLIAZZO R, et al.On the (im) Possibility of Obfuscating Programs[J]. Journal of the ACM (JACM), 2012, 59(2): 1-18.
|
[3] |
李震,何泾沙. 基于用户体验的模糊密码算法研究[J]. 信息网络安全,2016(11):73-78.
|
[4] |
HOHENBERGER S, ROTHBLUM G N, SHELAT A, et al.Securely Obfuscating Re-encryption[J]. Journal of cryptology, 2011, 24(4): 694-719.
|
[5] |
BRAKERSKI Z, ROTHOBLUM G N.Obfuscating Conjunctions[J]. Journal of Cryptology, 2017, 30(1): 289-320.
|
[6] |
BRAKERSKI Z, ROTHOBLUM G N.Black-box Obfuscation for D-CNFs[C]//ACM.Proceedings of the 5th Conference on Innovations in Theoretical Computer Science,Princeton, January 12-14, 2014,New Jersey, USA. New York:ACM, 2014: 235-250.
|
[7] |
GARG S, GENTRY C, SAHAI A, et al.Witness Encryption and Its Applications[C]// ACM.Proceedings of the 45th Annual ACM Symposium on Theory of Computing,June 1-4, 2013,Palo Alto, California, USA. New York: ACM, 2013: 467-476.
|
[8] |
BARAK B, BITANSKY N, CANETTI R, et al. Obfuscation for Evasive Functions[EB/OL]. ,2014-2-15.
|
[9] |
GOLDWASSER S, ROTHBLUM G.On Best-possible Obfuscation[J]. Theory of Cryptography, 2007 , 4392(3): 194-213.
|
[10] |
GARG S, GENTRY C, HALEVI S, et al.Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits[J]. SIAM Journal on Computing, 2016, 45(3): 882-929.
|
[11] |
SAHAI A,WATERS B.How to Use Indistinguishability Obfuscation: Deniable Encryption, and more[C]//ACM.Proceedings of the Forty-sixth Annual ACM Symposium on Theory of Computing, May 31 - June 3, 2014,New York, USA. New York: ACM, 2014: 475-484.
|
[12] |
HONHENBERGER S, SAHAI A, WATERS B. Replacing A Random Oracle: Full Domain Hash from Indistinguishability Obfuscation[EB/OL]. ,2014-5-15.
|
[13] |
DODIS Y, OLIVERIRA R, PIETRZAK K. On the Generic Insecurity of the Full Domain Hash[C]// ,2005-8-15.
|
[14] |
CHUNG K M, LIN H, PASS R.Constant-round Concurrent Zero Knowledge from P-certificates[J]. Annual IEEE Symposium on Foundations of Computer Science, 2013 , 19(17) :50-59.
|
[15] |
BADRINARAYANAN S, GOYAL V, JAIN A, et al. Verifiable Functional Encryption[EB/OL]. ,2017-4-15.
|
[16] |
BITANSKY N.Indistinguishability Obfuscation from Functional Encryption[EB/OL]. ,2015-10-20.
|
[17] |
ANANTH P, BONEH D, GARG S, et al. Differing-Inputs Obfuscation and Applications[EB/OL].,2017-4-15.
|
[18] |
BONEH D, ZHANDRY M. Multiparty Key Exchange, Efficient Traitor Tracing,More from Indistinguishability Obfuscation[J]. Algorithmica , 2014 , 8616 :1-53.
|
[19] |
BOYLE E, CHUNG K M, PASS R. On Extractability Obfuscation[EB/OL]. ,2017-4-15.
|
[20] |
CHUNG K M, LIN H, PASS R. Constant-round Concurrent Zero-Knowledge from Indistinguishability Obfuscation[EB/OL]. .2017-4-15.
|