Author:
Chen Jie,Lim Hoon Wei,Ling San,Wang Huaxiong,Wee Hoeteck
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference37 articles.
1. Agrawal S., Boneh D., Boyen X.: Efficient lattice (H)IBE in the standard model. In: EUROCRYPT, pp. 553–572 (2010).
2. Ateniese G., Kirsch J., Blanton M.: Secret handshakes with dynamic and fuzzy matching. In: NDSS (2007).
3. Ballard L., Green M., de Medeiros B., Monrose F.: Correlation-resistant storage via keyword-searchable encryption. IACR Cryptology ePrint Archive, Report 2005/417 (2005).
4. Barker E., Barker W., Burr W., Polk W., Smid M.: Recommendation for key management—part 1: general (revised). NIST Special Pub 800–57 (2007).
5. Barreto P.S.L.M., Naehrig M.: Pairing-friendly elliptic curves of prime order. In: Selected Areas in Cryptography, pp. 319–331 (2005).
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献