共 42 条
[21]
Wang Q., Wang C., Li J., Et al., Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Lecture Notes in Computer Science, 5789, pp. 355-370, (2009)
[22]
Zeng K., Publicly Verifiable Remote Data Integrity, Lecture Notes in Computer Science, 5308, pp. 419-434, (2008)
[23]
Song D., Wagner D., Perrig A., Practical Techniques for Searches on Encrypted Data, Proceedings of the IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
[24]
Boneh D., Crescenzo G., Ostrovsky R., Et al., Public Key Encryption with Keyword Search, Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'04), Lecture Notes in Computer Science, 3027, pp. 506-522, (2004)
[25]
Park D., Kim K., Lee P., Public Key Encryption with Conjunctive Field Keyword Search, Proceedings of the Workshop on Information Security Applications, Lecture Notes in Computer Science, 3325, pp. 73-86, (2004)
[26]
Swaminathan A., Mao Y., Su G., Et al., Confidentiality-Preserving Rank-Ordered Search, Proceedings of the ACM Workshop on Storage Security and Survivability, pp. 7-12, (2007)
[27]
Gentry C., Fully Homomorphic Encryption Using Ideal Lattices, Proceedings of the ACM International Symposium on Theory of Computing, pp. 169-178, (2009)
[28]
Stehle D., Steinfeld R., Faster Fully Homomorphic Encryption, Proceedings of ASIACRYPT 2010, Lecture Notes in Computer Science, 6477, pp. 377-394, (2010)
[29]
Dijk M., Gentry C., Halevi S., Vaikuntanathan V., Fully Homomorphic Encryption over the Integers, Proceedings of EUROCRYPT 2010, Lecture Notes in Computer Science, 6110, pp. 24-43, (2010)
[30]
Gentry C., Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness, Proceedings of CRYPTO 2010, Lecture Notes in Computer Science, 6223, pp. 116-137, (2010)