Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference28 articles.
1. Public key encryption with keyword search;Boneh,2004
2. Probabilistic public key encryption with equality test;Yang,2010
3. Identity-based encryption with outsourced equality test in cloud computing;Ma;Inform. Sci.,2016
4. Identity-based encryption from the weil pairing;Boneh,2001
5. Public key encryption schemes supporting equality test with authorisation of different granularity;Tang;Int. J. Appl. Cryptogr.,2012
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献