共 29 条
- [1] Boneh D, Di C G, Ostrovsky R, Et al., Public key encryption with keyword search, LNCS 3027: Proc of the 23rd Int Conf on the Theory and Application of Cryptographic Techniques, pp. 506-522, (2004)
- [2] Boneh D, Franklin M., Identity-based encryption from the weil pairing, LNCS 2139: Proc of the CRYPTO 2001, pp. 213-229, (2001)
- [3] Baek J, Safavinaini R, Susilo W., Public key encryption with keyword search revisited, LNCS 5072: Proc of 2008 Int Conf on Computation Science and Its Aplications, pp. 1249-1259, (2008)
- [4] Rhee H S, Park J H, Susilo W, Et al., Trapdoor security in a searchable public-key encryption scheme with a designated tester, Journal of Systems and Software, 6, 5, pp. 237-243, (2010)
- [5] Rhee H S, Park J H, Susilo W, Et al., Improved searchable public key encryption with designated tester, Proc of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376-379, (2009)
- [6] Fang Liming, Susilo W, Ge Chunpeng, Et al., A secure channel free public key encryption with keyword search scheme without random oracle, LNCS 5888: Proc of CANS 2009, pp. 248-258, (2009)
- [7] Gentry C., Practical identity-based encryption without random oracles, Proc of the 25th Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 445-464
- [8] Fang Liming, Susilo W, Ge Chunpeng, Et al., Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Information Sciences, 238, 7, pp. 221-241, (2013)
- [9] Byun J W, Rhee H S, Park H A, Et al., Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, Proc of the 3rd VLDB Workshop on Secure Data Management(SDM 2006), pp. 75-83, (2006)
- [10] Park D, Kim K, Lee P J., Public key encryption with conjunctive field keyword search, Proc of Int Conf on Information Security Applications, pp. 73-86, (2004)