1. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE Computer Society, Washington, DC (2007)
2. Lecture Notes in Computer Science;V Boyko,1999
3. Costan, V., Devadas, S.: Intel SGX explained. Cryptology ePrint Archive, Report 2016/086 (2016).
https://eprint.iacr.org/2016/086
4. Dowsley, R., Michalas, A., Nagel, M., Paladi, N.: A survey on design andimplementation of protected searchable data in the cloud. Comput. Sci. Rev. 26, 17–30 (2017)
5. Fisch, B., Vinayagamurthy, D., Boneh, D., Gorbunov, S.: Iron: functional encryption using Intel SGX. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 765–782. ACM (2017)