1 |
Q. Tang, "Public key encryption supporting plaintext equality test and user-specified authorization," Security and Communication Networks, vol. 5, no. 12, pp. 1351-1362, Dec. 2012.
DOI
|
2 |
S. Canard, G. Fuchsbauer, A. Gouget, and F. Laguillaumie, "Plaintext-checkable encryption," Proceedings of the Cryptographis' Track at the RSA Conference, LNCS 7178, pp. 332-348, Mar. 2012
|
3 |
I.R. Jeong, J.O. Kwon, D.W. Hong, and D.H. Lee, "Constructing PEKS schemes secure against keyword guessing attacks is possible?," Computer Communications, vol. 32, no. 2, pp. 394-396, Feb. 2009.
DOI
ScienceOn
|
4 |
J. Baek, R. Safavi-Naini, and W. Susilo, "On the integration of public key data encryption and public key encryption with keyword search," Proceedings of the 9th International Conference on Information Security, LNCS 4176, pp. 217-232, Sept. 2006.
|
5 |
G. Yang, C.H. Tan, Q. Huang, and D.S. Wong, "Probabilistic public key encryption with equality test," Proceedings of the Cryptographis' Track at the RSA Conference, LNCS 5985, pp. 119-131, Mar. 2010.
|
6 |
이영민, 구우권, 이현숙, 이동훈, "고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템," 정보보호학회논문지, 21(5), pp. 3-13, 2011년 10월.
|