1 |
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," Proc. ACM Conf. on Computer and Communications Security (CCS '06), pp. 79-88, Oct. 2006.
|
2 |
J. Shao, Z. Cao, X. Liang, and H. Lin, "Proxy re-encryption with keyword search," Information Sciences, Vol. 180, No. 13, pp. 2566-2587, July 2010.
|
3 |
C. Dong, G. Russello, and N. Dulay, "Shared and searchable encrypted data for untrusted servers," Proc. Conf. Data and Applications Security (DAS 2008), LNCS 5094, pp. 127-143, Springer, July 2008.
|
4 |
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology, Crypto 2001, LNCS 2139, pp. 41-62, Springer, August 2001.
|
5 |
J.H. Park, H.J. Kim, M.H. Sung, and D.H. Lee, "Public key broadcast encryption scheme with shorter transmissions," IEEE Trans. on Broadcasting, Vol. 54, No. 3, pp. 401-411, September 2008.
DOI
ScienceOn
|
6 |
A. Lewko, A. Sahai, and B. Walters, "Revocation systems with very small private keys," Proc. IEEE Symp. Security and Privacy, pp. 273-285, May 2010.
|
7 |
J. Hur and D. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. on Parallel and Distributed Systems, Vol. 22, No. 7, pp. 1214-1221, July 2011.
DOI
ScienceOn
|
8 |
J. Weng, Y. Yang, Q. Tang, R.H. Deng, and F. Bao, "Efficient conditional proxy re-encryption with chosen-ciphertext security," Proc. Information Security Conf. (ISC 2009), LNCS 5735, pp. 151-166, Springer, September 2009.
|
9 |
J. Zhao, D. Feng, and Z. Zhang, "Attribute-based conditional proxy re-encryption with chosen-ciphertext security," Proc. Global Telecommunication Conf. (GLOBECOM 2010), pp. 1-6, December 2010.
|
10 |
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," Proc. IEEE Symp. on Security and Privacy, pp. 41-55, May 2000.
|
11 |
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," Advances in Cryptology, Eurocrypt 2004, LNCS 3027, pp. 506-522, Springer, May 2004.
|
12 |
J. Baek, R. Safav-Naini, and W. Susilo, "On the integration of public key data encryption and public key encryption with keyword search," Proc. Information Security Conference (ISC 2006), LNCS 4176, pp. 217-232, Springer, September 2006.
|
13 |
Y.H. Hwang and P.J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Proc. Pairing 2007, LNCS 4575, pp. 2-22, Springer, July 2007.
|
14 |
C.K. Wong, M. Goulda, and S.S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. on Networking, Vol. 8, No. 1, pp. 16-30, Feb. 2000.
DOI
ScienceOn
|
15 |
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertextpolicy attribute-based encryption," Proc. of the IEEE Symp. on Security and Privacy, pp. 321-334, May 2007.
|
16 |
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. on Information and System Security, Vol. 9, No. 1, pp. 1-30, Feburary 2006.
DOI
|
17 |
F. Bao, R.H. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user setting," Proc. Information Security Practice and Experience (ISPEC 2008), LNCS 4991, pp. 71-85, Springer, April 2008.
|