共 39 条
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[3]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[6]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[7]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[8]
Cash D, 2014, LECT NOTES COMPUT SC, V8441, P351, DOI 10.1007/978-3-642-55220-5_20
[10]
Fu Z., 2016, 2016 UKACC 11 INT C, P1, DOI 10. 1109/INFOCOM. 2016. 7524606