共 37 条
- [1] Abdalla M, 2012, LECT NOTES COMPUT SC, V7293, P316, DOI 10.1007/978-3-642-30057-8_19
- [2] From Selective to Adaptive Security in Functional Encryption [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 657 - 677
- [3] [Anonymous], 2017, 20171060 CRYPT EPRIN
- [4] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
- [5] Σοφοζ - Forward Secure Searchable Encryption [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
- [6] Chosen-Ciphertext Secure Fully Homomorphic Encryption [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
- [7] Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [8] Leakage-Abuse Attacks Against Searchable Encryption [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
- [9] Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
- [10] Cash D, 2014, LECT NOTES COMPUT SC, V8441, P351, DOI 10.1007/978-3-642-55220-5_20