共 35 条
[1]
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[4]
[Anonymous], 1985, P 17 ANN ACM S THEOT
[5]
[Anonymous], 1996, SECURE SCHEMES SECRE
[6]
Bellare M., 2013, USENIX C SEC, P179
[7]
Interactive Message-Locked Encryption and Secure Deduplication
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:516-538
[8]
Message-Locked Encryption and Secure Deduplication
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013,
2013, 7881
:296-312
[9]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[10]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213