Author:
Rhee Hyun Sook,Park Jong Hwan,Lee Dong Hoon
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference22 articles.
1. Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions;Abdalla;Journal of Cryptology,2008
2. D. Boneh, A. Boldyreva, A. Desai, D. Pointcheval, Key-privacy in public-key encryption, in: Proceedings of Asiacrypt’01, LNCS 2248, 2001, pp. 566–582.
3. D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proceedings of Eurocrypt’04, LNCS 3027, 2004, pp. 506–522.
4. Chosen-ciphertext security from identity-based encryption;Boneh;SIAM Journal of Computing(SICOMP),2006
5. D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in: Proceedings of Crypto’01, LNCS 2139, 2001, pp. 213–229.
Cited by
53 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献