Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 342-347.doi: 10.11896/j.issn.1002-137X.2017.11A.072
Previous Articles Next Articles
LI Xiao-rong, SONG Zi-ye, REN Jing-yi, XU Lei and XU Chun-gen
[1] SONG D,WAGNER D,PERRI G.A Practical techniques for searches on encrypted data[C]∥Proceedings of IEEE Symposium on Securityand Privacy.Berkeley,2000:44-55. [2] BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Publickey encryption with keyword search[C]∥Proceedings of the EUROCRYPT’04.Interlaken,Switzerland,2004:506-522. [3] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA,2006:89-98. [4] BENALOH J,CHASE M,HORVITZ E,et al.Patient Con-trolled Encryption:Ensuring Privacy of Electronic Medical Records[C]∥Proceeding of the ACM Workshop Cloud Computing Security(CCSW’09).2009:103-114. [5] KULVAIBHAV K,VIJAYARAGHAVAN V,RAJARATHNAMN.Multi-users Attribute Based Searchable Encryption[C]∥Proceeding of International Conference on Mobile Data Management.Milan:IEEE Computer Society,2013:200-205. [6] 王少辉,韩志杰,肖甫,等.指定测试者的基于身份的可搜索加密方案[J].通信学报,2014,5(7):22-32. [7] LI J,ZHANG L.Attribute-based keyword search and data access control in cloud[C]∥2014 Tenth International Conference on Computational Intelligence and Security (CIS).IEEE,2014:382-386. [8] 林鹏,江颉,陈铁明.云环境下关键词搜索加密算法研究[J].通信学报,2015,36(Z1):259-265. [9] QIU S,LIU J,SHI Y,et al.Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack [J].Science China Information Sciences,2017,60(5):052105. [10] 刘全明,赵宝,高富强.基于属性的可搜索加密方案[J].山西大学学报(自然科学版),2016,9(4):593-600. [11] 陈燕俐,杨华山.可支持属性撤销的基于 CP-ABE可搜索加密方案[J].重庆邮电大学学报(自然科学版),2016,8(4):545-554. [12] 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,7(5):1017-1024. [13] BEIMEL A,et al.Secure schemes for secret sharing and key distribution[R].Technion-Israel Institute of Technology,Faculty of Computer Science,1996. [14] GENTRY C.Practical identity-based encryption without random oracles[C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2006:445-464. [15] 郭璐璐.对密文查询和基于查询的可搜索加密方案的研究[D].南京:南京理工大学,2014. [16] 杨旸,林柏钢,马懋德.具有细粒度访问控制的隐藏关键词可搜索加密方案[J].通信学报,2013,4(Z1):92-100. [17] HAN F,QIN J,ZHAO H,et al.A general transformation from KP-ABE to searchable encryption[J].Future Generation Computer Systems,2014,30:107-115. [18] BONEH D,BOYEN X.Efficient selective-ID secure identity-based encryption without random oracles[C]∥International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2004:223-238. [19] BONEH D,BOYEN X,GOH E J.Hierarchical identity based encryption with constant size ciphertext[C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2005:440-456. [20] BONEH D,GENTRY C,WATERS B.Collusion resistant bro-adcast encryption with short ciphertexts and private keys[C]∥Annual International Cryptology Conference.Springer Berlin Heidelberg,2005:258-275. [21] BONEH D,KATZ J.Improved efficiency for CCA-secure cryptosystems built using identity-based encryption[C]∥Cryptographers’ Track at the RSA Conference.Springer Berlin Heidelberg,2005:87-103. [22] 马春光,石岚,汪定.基于访问树的属性基签名算法[J].电子科技大学学报,2013,42(3):410-414. [23] 李经纬,贾春福,刘哲理.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128. |
No related articles found! |
|