共 17 条
[1]
Practical techniques for searches on encrypteddata. Song D X,et al. IEEE Symposium on Security and Privacy . 2000
[2]
Secure indexes. E.-J. Goh. Technical Report2003/216 . 2003
[3]
Improved proxy re-encryption schemes with applications to secure distributed storage. Ateniese G,Fu K,Green M,et al. Proc of the 12th International Conference on Practice and Theory in Public Key Cryptogrphy . 2005
[4]
Key-aggregate cryptosystem for scalable data sharing in cloud storage. Chu C,Chow S,Tzeng W. IEEE Transactions on Parallel and Distributed Systems . 2014
[5]
Digital provenance enabling secure data forensics in cloud computing. Li Jin,Chen Xiaofeng,Huang Qiong,et al. IEEE Transactions on Parallel and Distributed Systems . 2013
[6]
Privacy Preserving Keyword Searches on Remote Encrypted Data. Chang YC,Mitzenmacher M. Proceedings of the3rd International Conference on Applied Cryptography and Network Security . 2005
[7]
Fine-grained access control based on outsourced attribute-based encryption. Li Jin,Chen Xiaofeng,Li Jingwei,et al. Proc of the 18th European Symposium on Research in Computer Security . 2013
[8]
Computationally efficient searchablesymmetric encryption. Van Liesdonk P,Sedghi S,Doumen J, et al. Secure Data Management . 2010
[9]
Search-able symmetric encryption:Improved definitions and efficientconstructions. Curtmola R,Garay J A,Kamara S,Ostrovsky R. Proceedings of the 13th ACM Conference onComputer and Communications Security (CCS 2006) . 2006
[10]
Public key encryption with keyword search based on K-resilient IBE. Khader D. Proc of International Conference on Computational Science and Its Applications . 2007