1 |
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil Pairing," ASIACRYPT, LNCS 2248, pp. 514-532. 2001.
|
2 |
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," ACNS, LNCS 3089, pp. 31-45, 2004.
|
3 |
D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," TCC, LNCS 4392, pp. 535-554, 2007.
|
4 |
J. Katz, A. Sahai, and B. Waters, "Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products," EUROCRYPT, LNCS 4965, pp. 146-162, 2008.
|
5 |
E. Goh, "Secure Indexes," Technical report 2003/216, In IACR ePrint Cryptography Archive, Oct. 2003.
|
6 |
노건태, 천지영, 정익래, 이동훈, "프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법," 정보보호학회논문지, 19(5), pp. 35-44, 2009년 10월.
|
7 |
S. Yau and Y. Yin, "Controlled privacy preserving keyword search," ASIACCS, pp. 321-324, Mar. 2008
|
8 |
Y. Chang, and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," ACNS, LNCS 3531, pp. 442-455, 2005.
|
9 |
R. Curtmola, J. Garay, S. Kamara, R. Ostrovskey. "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," ACM CCS, pp. 79-88, Oct. 2006.
|
10 |
F. Bao, R. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user settings," Information Security Practice and Experience, 4th International Conference, LNCS 4991, pp. 71-85. 2008.
|
11 |
김선영, 서재우, 이필중, "검색가능 암호기술의 연구 동향," 정보보호학회지, 19(2), pp. 63-73, 2009년 4월.
|
12 |
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," EUROCRYPT, LNCS 3027, pp. 506-522, 2004.
|
13 |
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," IEEE Symposium on Security and Privacy, pp. 44-55, May 2000.
|