
276
Big Data: Storage, Sharing, and Security
29. Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data.
In Salil P Vadhan, editor, Theory of Cryptography, Proceedings of the 4th Theory of
Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21–24,
2007, volume 4392 of Lecture Notes in Computer Science, pp. 535–554. Springer.
30. Dan Boneh and Brent Waters. Constrained pseudorandom functions and their applica-
tions. In Advances in Cryptology—ASIACRYPT 2013—Proceedings of the 19th Interna-
tional Conference on the Theory and Application of Cryptology and Information Security,
Part II, Bengaluru, India, ...