共 40 条
[1]
Bag A., 2023, P 23 PRIV ENH TECHN, P139
[2]
Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Bost R., 2021, P 2016 APPL CRYPT IN, P1143
[8]
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1465-1482
[9]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20