References
- P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," In Applied Cryptography and Network Security Conference, pp. 24-31, 2004.
- B. Waters, D. Balfanz, G. Durfee, and D. Smetters, "Building an Encrypted and Searchable Auditlog," NDSS, pp. 1-10, 2004.
- R. Ostrovsky and W. Skeith, "Private Searching on Streaming Data," Crypto, pp. 397-430, 2005.
- J. Bethencourt, H. Chan, A. Perrig, E. Shi, and D. Song, "Anonymous Multi-Attribute Encryption with Range Query Conditional Decryption," Technical Report, C.M.U. pp. 1-38, 2006.
- 조남수, 홍도원, "검색 가능 암호 시스템 기술 동향," 전자통신동향분석, 23권, 4호, pp. 1-9, 8월, 2008년.
- R. Ostrovsky, "Software Protection and Simulations on Oblivious RAMs," ACM Symp. on Theory of Computing, Baltimore, MAryland, USA, May 14-16, pp. 514-523, 1990.
- P. Golle and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," Journal of ACM, Vol. 43, No. 3, pp. 431-473, 1996. https://doi.org/10.1145/233551.233553
- D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data," IEEE Symp. on Security and Privacy, 2000.
- E. J. Goh, "Secure Indexes," Technical Report 2003/216, IACR ePrint Crpytography Archive, 2003.
- Y. C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," In Applied Cryptography and Network Security Conf., pp. 391-421, 2005.
- R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," ACMCCS, pp. 79-88, 2006.
- D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Eurocrypt, LNCS 3027, pp. 506-522, 2004.
- D. Boneh and B. Waters, "Conjunctive, Subset and Range Queries on Encrypted Data," Theory of Cryptography Conf., pp. 1-29, 2007.
- 차병래, 한경헌, 이지민, 안영은, 류재민, "다자간 정합 인증 시스템의 설계", 2009 한국정보기술학회 하계 학술대회, pp. 458-462, 6월, 12일, 2009.
- 차병래, 김대규, 김남호, 최세일, "검색 가능 이미지 암호 시스템의 개념 설계", 한국전자통신학회 춘계학술대회, pp. 217-220, 6월, 8일, 2012.