共 30 条
[1]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[3]
Attribute-Based Encryption with Expressive and Authorized Keyword Search
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I,
2017, 10342
:106-126
[4]
De Caro A, 2011, IEEE SYMP COMP COMMU
[5]
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III,
2018, 10822
:425-455
[6]
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:315-331