Constructing a searchable encrypted log using encrypted inverted indexes
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Vincent Rijmen,et al. Rijndael/AES , 2005, Encyclopedia of Cryptography and Security.
[4] Kaoru Kurosawa,et al. A Scheme for Partial Disclosure of Transaction Log , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.