Cited By
View all- Zhao FWang HWeng J(2024)Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from LatticesComputer Security – ESORICS 202410.1007/978-3-031-70896-1_12(238-258)Online publication date: 16-Sep-2024
- Chen ZWu ALi YXing QGeng S(2021)Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud ComputingSecurity and Communication Networks10.1155/2021/66196892021Online publication date: 1-Jan-2021
- Hu CLi ZLiu PYang RGuo SZhang H(2021)Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory AttacksMobile Networks and Applications10.1007/s11036-018-1101-426:6(2490-2500)Online publication date: 1-Dec-2021
- Show More Cited By