Author:
Wang Xianmiao,Wu Jiaojiao,Wang Jianfeng
Funder
National Natural Science Foundation of China
Key Research and Development Projects of Shaanxi Province
Reference43 articles.
1. Asghar Muhammad Rizwan, Russello Giovanni, Crispo Bruno, Ion Mihaela, 2013. Supporting complex queries and access policies for multi-user encrypted databases. In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, CCSW 2013, ACM, pp. 77–88.
2. Azraoui Monir, Elkhiyaoui Kaoutar, Önen Melek, Molva Refik, 2015. Publicly verifiable conjunctive keyword search in outsourced databases. In: Proceedings of 2015 IEEE Conference on Communications and Network Security, CNS 2015, IEEE, pp. 619–627.
3. Nowhere to leak: Forward and backward private symmetric searchable encryption in the multi-client setting (extended version);Bakas;IACR Cryptol. ePrint Arch.,2021
4. Bao Feng, Deng Robert H., Ding Xuhua, Yang Yanjiang, 2008. Private query on encrypted data in multi-user settings. In: Proceedings of Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21–23, 2008, volume 4991 of Lecture Notes in Computer Science, Springer, pp. 71–85.
5. Bost Raphaël, Fouque Pierre-Alain, Pointcheval David, 2016. Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptol. ePrint Arch. page 62.