|
[1]S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” in Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, January 2010. [2]Google Drive, https://drive.google.com/ [3]D. Song, D. Wagner, and A. Perrig, “Practical techniques for searching on encrypted data,” In IEEE Symposium on Research in Security and Privacy, pp. 44-55. IEEE Computer Society, 2000. [4]S.M. Bellovin and W.R. Cheswick, “Privacy-Enhanced Searches Using Encrypted Bloom Filters,” ePrint Archive, http://eprint.iacr.org/2004/022/, 2004. [5]E-J. Goh, “Secure indexeses,” Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003, http://eprint.iacr.org/2003/216 [6]Y.C. Chang and M. Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,” Proceedings of 3rd Applied Cryptography and Network Security Conference (ACNS), pp. 442-455, 2005. [7]R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, ”Searchable symmetric encryption: improved definitions and efficient constructions,” ACM Conference on Computer and Communications Security, pp. 79-88, 2006. [8]S. Kamara, C. Papamanthou, and T. Roeder, “CS2: A searchable cryptographic cloud storage system,” Technical Report MSR-TR-2011-58, Microsoft Research, 2011. http://research.microsoft.com/apps/pubs/?id=148632. [9]D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” In Advances in Cryptology - Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science, pp. 506-522, Springer-Verlag, 2004. [10]P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” In Applied Cryptography and Network Security Conference (ACNS), volume 3089 of Lecture Notes in Computer Science, pp. 31-45, Springer, 2004. [11]M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. M. Lee, G. Neven, P. Paillier and H. Shi, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions,” In Proc, of CRYPTO, pp. 205-222, 2005. [12]Y. C. Chang and M. Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,” In Proc, of 3rd Applied Cryptography and Network Security Conference (ACNS), pp. 442-455, 2005. [13]L. Ballard, S. Kamara and F. Monrose, “Achieving Efficient Conjunctive Keyword Searches over Encrypted Data,” In Proceedings of the Seventh International Conference on Information and Communication Security (ICICS 2005), pp. 414-426, 2005. [14]J. Byun, D. Lee and J. Lim, “Efficient Conjunctive Keyword Search on Encrypted Data Storage System,” In Proceedings of EuroPKI 2006, LNCS 4043, Springer-Verlag, pp. 184-196, 2006. [15]E. Ryu and T. Takagi, “Efficient Conjunctive Keyword-Searchable Encryption,” Advanced Information Networking and Applications Workshops, pp. 409-414, 2007. [16]D. Boneh, “The Decision-Diffie Hellman Problem,” In Third International Symposium on Algorithmic Number Theory (ANTS-III), vol. 1423 of Lecture Notes in Computer Science, pp. 48-63, Springer-Verlag, 1998. [17]D. Boneh and M. Franklin, “Identity based encryption from the Weil pairing,” In SIAM J. of Computing, vol. 32, no. 3, pp. 586-615, 2003. [18]A. Joux, “The Weil and Tate pairings as building blocks for public key cryptosystems,” In Proceedings Fifth Algorithmic Number Theory Symposium, 2002. [19]C.L. Lin and Y.C. Chen, “不具連結性搜尋樣式之加密資料搜尋,” 2009 International Conference on Advanced Information Technologies (AIT 2009), April 24th ~ 25th, 2009. [20]M. Blum and S. Goldwasser, “An efficient probabilistic public key encryption scheme which hides all partial information,” Proceedings of Advances in Cryptology - CRYPTO ’84, pp. 289–299, 1985. [21]C.L. Lin, “A False Positive-Based Unlinkable Ciphertext Searching for Cloud Storage Services,” 2012 International Conference on Business and Information (BAI 2012), July 3-5, 2012, Sapporo, Japan. [22]Dropbox, https://www.dropbox.com/ [23]Block cipher mode of operation, Electronic codebook mode(ECB mode), https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29 [24]Bouncy Castle, http://www.bouncycastle.org/
|