[confproc]
D. Song
/ 2000
/ Practical techniques for searches on encrypted data
/ Proc. IEEE Symp. on Security and Privacy
: 41~55
[journal]
D. Boneh
/ 2004
/ Public key encryption with keyword search
/ Advances in Cryptology, Eurocrypt 2004, LNCS
/ Springer
3027
: 506~522
[confproc]
J. Baek
/ 2006
/ On the integration of public key data encryption and public key encryption with keyword search
/ Proc. Information Security Conference (ISC 2006), LNCS
/ Springer
4176
: 217~232
[journal]
Y.H. Hwang
/ 2007
/ Public key encryption with conjunctive keyword search and its extension to a multi-user system
/ Proc. Pairing 2007, LNCS
/ Springer
4575
: 2~22
[journal]
C.K. Wong
/ 2000
/ Secure group communications using key graphs
/ IEEE/ACM Trans. on Networking
8
(1)
: 16~30
[journal]
J. Bethencourt
/ 2007
/ Ciphertextpolicy attribute-based encryption
/ Proc. of the IEEE Symp. on Security and Privacy
: 321~334
[journal]
G. Ateniese
/ 2006
/ Improved proxy re-encryption schemes with applications to secure distributed storage
/ ACM Trans. on Information and System Security
9
(1)
: 1~30
[journal]
F. Bao
/ 2008
/ Private query on encrypted data in multi-user setting
/ Proc. Information Security Practice and Experience (ISPEC 2008), LNCS
/ Springer
4991
: 71~85
[journal]
R. Curtmola
/ 2006
/ Searchable symmetric encryption: Improved definitions and efficient constructions
/ Proc. ACM Conf. on Computer and Communications Security (CCS ’06)
: 79~88
[journal]
J. Shao
/ 2010
/ Proxy re-encryption with keyword search
/ Information Sciences
180
(13)
: 2566~2587
[confproc]
C. Dong
/ 2008
/ Shared and searchable encrypted data for untrusted servers
/ Proc. Conf. Data and Applications Security (DAS 2008), LNCS
/ Springer
5094
: 127~143
[journal]
D. Naor
/ 2001
/ Revocation and tracing schemes for stateless receivers, Advances in Cryptology, Crypto 2001
/ LNCS
/ Springer
2139
: 41~62
[journal]
J.H. Park
/ 2008
/ Public key broadcast encryption scheme with shorter transmissions
/ IEEE Trans. on Broadcasting
54
(3)
: 401~411
[confproc]
A. Lewko
/ 2010
/ Revocation systems with very small private keys
/ Proc. IEEE Symp. Security and Privacy
: 273~285
[journal]
J. Hur
/ 2011
/ Attribute-based access control with efficient revocation in data outsourcing systems
/ IEEE Trans. on Parallel and Distributed Systems
22
(7)
: 1214~1221
[confproc]
J. Weng
/ 2009
/ Efficient conditional proxy re-encryption with chosen-ciphertext security
/ Proc. Information Security Conf. (ISC 2009), LNCS
/ Springer
5735
: 151~166
[confproc]
J. Zhao
/ 2010
/ Attribute-based conditional proxy re-encryption with chosen-ciphertext security
/ Proc. Global Telecommunication Conf. (GLOBECOM 2010)
: 1~6