Author:
Gong Li,Liu Ao,He Long,Ban Xinbo,Chen Hang
Publisher
Springer Nature Singapore
Reference24 articles.
1. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)
2. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)
3. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of S&P, pp. 44–55. IEEE (2000)
4. Lecture Notes in Computer Science;D Boneh,2004
5. Zheng, Y., Lu, R., Guan, Y., Shao, J., Zhu, H.: Achieving efficient and privacy-preserving exact set similarity search over encrypted data. IEEE Trans. Dependable Secure Comput. 19(2), 1090–1103 (2022)