Author:
Jeong Ik Rae,Kwon Jeong Ok,Hong Dowon,Lee Dong Hoon
Subject
Computer Networks and Communications
Reference12 articles.
1. M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions, in: CRYPTO 2005, LNCS 3621, 2005, pp. 205–222 (the full version appears in Journal of Cryptology (2007)).
2. M. Bellare, A. Boldyreva, A. O’Neill, Deterministic and efficiently searchable encryption, in: CRYPTO 2007, LNCS 4622, 2007, pp. 535–552.
3. D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Eurocrypt 2004, LNCS 3089, 2004, pp. 31–45.
4. D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: CRYPTO 2001, LNCS 2139, 2001, pp. 213–229 (the full version appears in SIAM Journal of Computing 32 (3) (2003) 586–615).
5. J.W. Byun, H.S. Rhee, H. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: SDM 2006, LNCS 4165, 2006, pp. 75–83.
Cited by
98 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献