Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference31 articles.
1. Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008). https://doi.org/10.1007/s00145-007-9006-6.
2. Ateniese G., Gasti P.: Universally anonymous IBE based on the quadratic residuosity assumption. In: Fischlin M. (ed.) Topics in Cryptology—CT-RSA 2009. LNCS, vol. 5473, pp. 32–47. Springer, Berlin (2009). https://doi.org/10.1007/978-3-642-00862-7_3.
3. Bellare M., Boldyreva A., Desai A., Pointcheval D.: Key-privacy in public-key encryption. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 566–582. Springer, Berlin (2001).
4. Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G.: Public key encryption with keyword search. In: Cachin C., Camenisch J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Berlin (2004). https://doi.org/10.1007/978-3-540-24676-3_30.
5. Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: Kilian J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Berlin (2001). https://doi.org/10.1007/3-540-44647-8_13.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献