共 29 条
[1]
Bai J., 2020, SOFT COMPUT, V24
[2]
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[3]
Message-Locked Encryption and Secure Deduplication
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013,
2013, 7881
:296-312
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[6]
Fast and Secure Updatable Encryption
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I,
2020, 12170
:464-493
[9]
Reclaiming space from duplicate files in a serverless distributed file system
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:617-624
[10]
Duan Y., 2014, P 6 ED ACM WORKSH CL, P57