Computer Science ›› 2015, Vol. 42 ›› Issue (11): 197-202.doi: 10.11896/j.issn.1002-137X.2015.11.041
Previous Articles Next Articles
FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong
[1] Abdalla M,Bellare M,Catalano D,et al.Advances in Cryptology[C]∥CRYPTO 2005.Springer Berlin Heidelberg,2005:205-222 [2] Baek J,Safavi-Naini R,Susilo W.Computational Science and Its Applications[C]∥ICCSA 2008.Springer Berlin Heidelberg,2008:1249-1259 [3] Boneh D,Boyen X.Efficient selective-ID Identity based encryption without random oracles[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:223-238 [4] Boneh D,Di C G,Ostrovsky R,et al.Public Key Encryptionwith Keyword Search[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:506-522 [5] Canetti R,Goldreich O,Halevi S.The random oracle methodology,revisited[C]∥Proc.of 30th ACM STOC.ACM Press,1998:209-218 [6] Canetti R,Halevi S,Katz J.Chosen-Ciphertext Security fromIdentity-Based Encryption[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:202-222 [7] Fang L,Susilo W,Ge C,et al.Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J].Information Sciences,2013,8:221-241 [8] Gentry C.Practical identity-based encryption without randomoracles[C]∥Proc.of EUROCRYPT 2006.Springer-Verlag,2006:457-464 [9] Gu C,Pan Y,Z A H.Efficient Public Key Encryption with Keyword Search Schemes from Pairings[M]∥Information Security and Cryptology:Third SKLOIS Conference.2008:372-382 [10] Waters B,Balfanz D,Durfee G,et al.Building an Encrypted and Searchable Audit Log[C]∥Network and Distributed System Security Symposium (NDSS 2004).2004 [11] Golle P,Staddon J,Waters B.Secure Conjunctive Search over Encrypted Data [C]∥Jakobsson M,Yung M,Zhou J,eds.Proc.ACNS 2004.Springer-Verlag,2004:31-45 [12] Hofheinz D,Weinreb E.Searchable encryption with decryption in the standard model:Report 2008/423[R].Cryptology ePrint Archive,2008:1-17 [13] Jeong I R,Kwon J O,Hong D,et al.Constructing PEKSschemes secure against keyword guessing attacks is possible? [J].Computer Communications,2009,32(2):394-396 [14] Park D J,Kim K,Lee P J.Public Key Encryption with Conjunctive Field Keyword Search[M]∥Lim C H,Yung M,eds.Information Security Applications:5th International Workshop,WISA 2004.Springer Berlin Heidelberg,2005:73-86 [15] Rhee H S,Park J H,Susilo W,et al.Improved searchable public key encryption with designated tester[C]∥Proc.of the 4th international Symposium on information,Computer,and Communications Security(ASIACCS ’09).ACM,New York,NY,2009:376-379 [16] Rhee H S,Susilo W,Kim H-J.Secure searchable public key encryption scheme against keyword guessing attacks[J].IEICE Electron,2009,6(5):237-243 [17] Rhee H S,Park J H,Lee D H.Generic construction of designa-ted tester public-key encryption with keyword search[J].Information Sciences,2012,205(1):93-109 [18] Xu P,Jin H,Wu Q,et al.Public-Key Encryption with FuzzyKeyword Search:A Provably Secure Scheme under Keyword Guessing Attack[J].IEEE Transactions on Computers,2013,62(11):2266-2277 [19] Yau W C,Heng S H,Goi B.Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes[C]∥Proc.of ATC 2008.Springer-Verlag,2008:100-105 [20] Zhang R,Imai H.Generic combination of public key encryption with keyword search and public key encryption[C]∥6th International Conference Proc.of Cryptology and Network Security.Springer-Verlag,2007:159-174 [21] 孙婷,王建东.基于模糊关键词搜索的无安全信道公钥加密[J].计算机应用与软件,2014,1(3):308-309 Sun Ting,Wang Jian-dong.Encrypting pubilc key without secure channel based on fuzzy keyword search[J].Computer Applications and Software,2014,1(3):308-309 [22] 李双.一种安全的具有匿名性的可搜索加密方案[J].计算机工程与应用,2013,9(16):97-102 Li Shuang.Safe anonymous identity based public key encryption with keyword search[J].Computer Engineering and Applications,2013,49(16):97-102 [23] 王映康,罗文俊.云存储环境下多用户可搜索加密方案[J].电信科学,2012,28(11):103-107 Wang Ying-kang,Luo Wen-jun.A scheme of multi-user searchable encryption in clould storage[J].Journal Electronic,2012,28(11):103-107 [24] 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,37(5):1017-1024 Li Shuang,Xu Mao-zhi.Attribute based public key encryption with keyword search[J].Chinese Journal of Computers,2014,37(5):1017-1024 [25] 杨健,杨邓奇,王剑.关键词可检索的公钥加密技术综述[J].计算机应用,2014,34(7):1878-1883,1896 Yang Jian,Yang Deng-qi,Wang Jian.Overview of public key encryption with keyword search[J].Journal of Computer Applications,2014,34(7):1878-1883,1896 |
No related articles found! |
|