He, Jingnan; Jing, Wenpan; Li, Bao; Lu, Xianhui; Jia, Dingding Dual-mode cryptosystem based on the learning with errors problem. (English) Zbl 1426.94103 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10343, 443-451 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{J. He} et al., Lect. Notes Comput. Sci. 10343, 443--451 (2017; Zbl 1426.94103) Full Text: DOI
Jing, Wenpan; Lu, Xianhui; Li, Bao Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation. (English) Zbl 1404.94083 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 291-308 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Jing} et al., Lect. Notes Comput. Sci. 10143, 291--308 (2017; Zbl 1404.94083) Full Text: DOI
Liu, Yamin; Lu, Xianhui; Li, Bao; Jing, Wenpan; Fang, Fuyang Approximate-deterministic public key encryption from hard learning problems. (English) Zbl 1411.94075 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 25-42 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Liu} et al., Lect. Notes Comput. Sci. 10095, 25--42 (2016; Zbl 1411.94075) Full Text: DOI