Список использованных источников к разделу «Многоключевой поиск по зашифрованным данным»

From CryptoWiki
Jump to: navigation, search

[1] Raluca Ada Popa and Nickolai Zeldovich. Multi-Key Searchable Encryption [1]

[2] PBC library: The pairing-based cryptography library. [2]

[3] Feng Bao, Robert H. Deng, Xuhua Ding, and Yanjiang Yang. Private query on encrypted data in multi-user settings. In ISPEC, pages 71–85, 2008. [3]

[4] Mihir Bellare, Alexandra Boldyreva, and Adam O’Neill. Deterministic and efficiently searchable encryption. In CRYPTO, pages 535–552, 2007. [4]

[5] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In EUROCRYPT’04, pages 506–522, 2004. [5]

[6] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, pages 535–554, 2007. [6]

[7] David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, and Michael Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. Cryptology ePrint Archive, Report 2013/169, 2013. [7]

[8] Yan-Cheng Chang and Michael Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In ACNS, pages 442–455, 2005. [8]

[9] Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS, pages 79–88, 2006. [9]

[10] S. D. Galbraith, K. G. Paterson, and N. P. Smart. Pairings for cryptographers. Discrete Applied Mathematics, 156, 2008. [10]

[11] Eu-Jin Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216. [11]

[12] Seny Kamara, Charalampos Papamanthou, and Tom Roeder. Dynamic searchable symmetric encryption. In CCS, pages 965–976, 2012. [12]

[13] Adriana López-Alt, Eran Tromer, and Vinod Vaikuntanathan. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In STOC, pages 1219–1234, 2012. [13]

[14] Remya Rajan. Efficient and privacy preserving multi user keyword search for cloud storage services. In IJATER, pages 48–51, 2012. [14]

[15] Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Proceedings of the 21st IEEE Symposium on Security and Privacy, Oakland, CA, May 2000. [15]

[16] Yanjiang Yang, Haibing Lu, and Jian Weng. Multi-user private keyword search for cloud computing. In CloudCom, pages 264–271, 2011. [16]

[17] Fangming Zhao, Takashi Nishide, and Kouichi Sakurai. Multi-user keyword search scheme for secure data sharing with fine-grained access control. In ICISC, pages 406–418, 2011. [17]