Affiliation:
1. The University of Tokyo
2. National Institute of Advanced Industrial Science and Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference22 articles.
1. [1] J. Hayata, M. Ishizaka, Y. Sakai, G. Hanaoka, and K. Matsuura, “Generic construction of adaptively secure anonymous key-policy attribute-based encryption from public-key searchable encryption,” ISITA 2018, pp.739-743, 2018. 10.23919/isita.2018.8664291
2. [2] D.X. Song, D.A. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” IEEE Symposium on Security and Privacy 2000, pp.44-55, 2000. 10.1109/secpri.2000.848445
3. [3] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” EUROCRYPT 2004, pp.506-522, 2004. 10.1007/978-3-540-24676-3_30
4. [4] M.I. Salam, W.-C. Yau, J.-J. Chin, S.-H. Heng, H.-C. Ling, R.C.-W. Phan, G.S. Poh, S.-Y. Tan, and W.-S. Yap, “Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage,” Hum. Cent. Comput. Inf. Sci., vol.5, no.19, 2015. 10.1186/s13673-015-0039-9
5. [5] E.-J. Goh, “Secure indexes,” IACR Cryptology ePrint Archive 2003: 216, 2003.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献