[1] |
傅颖勋, 罗圣美, 舒继武 . 一种云存储环境下的安全网盘系统[J]. 软件学报, 2014,25(8): 1831-1843.
|
|
FU Y X , LUO S M , SHU J W . Secure online storage system based on cloud storage environment[J]. Journal of Software, 2014,25(8): 1831-1843.
|
[2] |
薛矛, 薛巍, 舒继武 ,等. 一种云存储环境下的安全存储系统[J]. 计算机学报, 2015,38(5): 987-998.
|
|
XUE M , XUE W , SHU J W ,et al. A secure storage system over cloud storage environment[J]. Chinese Journal of Computers, 2015,38(5): 987-998.
|
[3] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Advances in Cryptology (EUROCRYPT 2005),Aarhus,Denmark,2005. Berlin Heidelberg:Springer, 2005: 457-473.
|
[4] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security (CCS’ 06). 2006: 89-98.
|
[5] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// The 2007 IEEE Symposium on Security and Privacy (SP’ 07)2007. 2008: 321-334.
|
[6] |
ATTRUPADUNG N , HERRANZ J , LAGUILLAUME F ,et al. Attribute-based encryption schemes with constant-size ciphertexts[J]. Theoretical Computer Science, 2012,422: 15-38.
|
[7] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// The 20th USENIX conference on security (SEC 2011). 2011: 34-49.
|
[8] |
SONG D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// The IEEE Symposium on Security and Privacy(S&P’00). 2000: 44-55.
|
[9] |
BONEH D , CRESCENZOM G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// The International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004). 2004: 506-522.
|
[10] |
LEE C C , HSU S T , H M S . A study of conjunctive keyword searchable schemes[J]. International Journal of Network Security, 2013,15(5): 321-330.
|
[11] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// Applied Cryptography and Network Security Conference (ACNS 2004). 2004: 31-45.
|
[12] |
PARK D J , KIM K , and LEE P J . Public key encryption with conjunctive-field keyword search[C]// The 5th Information Security Applications International Workshop (WISA 2004). 2004: 73-86.
|
[13] |
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]// The First International Conference of Pairing-Based Cryptography (Pairing 2007). 2007: 2-22.
|
[14] |
ZHANG B , ZHANG F G . An efficient public key encryption with conjunctive-subset keywords search[J]. Journal of Network and Computer Applications, 2011,34(1): 262-267.
|