Author:
Xiang Tao,Li Xiaoguo,Chen Fei,Yang Yuanyuan,Zhang Shengyu
Funder
National Natural Science Foundation of China
Fundamental Research Funds for the Central Universities
CCF-Venustech Fuding
Graduate Scientific Research and Innovation Foundation of Chongqing
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference35 articles.
1. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in: Proc. of ACM Conference on Computer and Communications Security, CCS, 2007, pp. 598–609.
2. S. Benabbas, R. Gennaro, Y. Vahlis, Verifiable delegation of computation over large datasets, in: Advances in Cryptology-CRYPTO, 2011, pp. 111–131.
3. Space/time trade-offs in hash coding with allowable errors;Bloom;Commun. ACM,1970
4. Aggregate and verifiably encrypted signatures from bilinear maps;Boneh,2003
5. A survey of provably secure searchable encryption;Bösch;ACM Comput. Surv.,2014
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献