SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. Proceedings of 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2000: 44–55.
|
LIU Zheli, WENG Jian, LI Jin, et al. Cloud-based electronic health record system supporting fuzzy keyword search[J]. Soft Computing, 2016, 20(8): 3243–3255. doi: 10.1007/s00500-015-1699-0
|
王尚平, 刘利军, 张亚玲. 一个高效的基于连接关键词的可搜索加密方案[J]. 电子与信息学报, 2013, 35(9): 2266–2271. doi: 10.3724/SP.J.1146.2012.01036WANG Shangping, LIU Lijun, and ZHANG Yaling. An efficient conjunctive keyword searchable encryption scheme[J]. Journal of Electronics &Information Technology, 2013, 35(9): 2266–2271. doi: 10.3724/SP.J.1146.2012.01036
|
黄海平, 杜建澎, 戴华, 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389–396. doi: 10.11999/JEIT160338HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage[J]. Journal of Electronics &Information Technology, 2017, 39(2): 389–396. doi: 10.11999/JEIT160338
|
刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40(3): 683–689. doi: 10.11999/JEIT170448LIU Zhenhua, ZHOU Peilin, and DUAN Shuhong. Attribute-based proxy re-encryption scheme with keyword search[J]. Journal of Electronics &Information Technology, 2018, 40(3): 683–689. doi: 10.11999/JEIT170448
|
TARIQ H and AGARWAL P. Secure keyword search using dual encryption in cloud computing[J]. International Journal of Information Technology, 2018(7): 1–10. doi: 10.1007/s41870-018-0091-6
|
CHEN Rongmao, MU Yi, YANG Guomin, et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 789–798. doi: 10.1109/TIFS.2015.2510822
|
MIAO Yinbin, MA Jianfeng, LIU Ximeng, et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings[J]. Science China Information Sciences, 2017, 60(12): 122105. doi: 10.1007/s11432-016-0540-x
|
CUI Baojiang, LIU Zheli, and WANG Lingyu. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage[J]. IEEE Transactions on Computers, 2016, 65(8): 2374–2385. doi: 10.1109/TC.2015.2389959
|
ZHOU Rang, ZHANG Xiaosong, DU Xiaojiang, et al. File-centric multi-key aggregate keyword searchable encryption for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3648–3658. doi: 10.1109/TII.2018.2794442
|
RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763–771. doi: 10.1016/j.jss.2009.11.726
|
赵洋, 包文意, 熊虎, 等. 云计算里一种陷门无法识别的公钥搜索加密方案[J]. 信息网络安全, 2016(1): 1–5. doi: 10.3969/j.issn.1671-1122.2016.01.001ZHAO Yang, BAO Wenyi, XIONG Hu, et al. A scheme of public encryption keyword search with indistinguishable trapdoor[J]. Netinfo Security, 2016(1): 1–5. doi: 10.3969/j.issn.1671-1122.2016.01.001
|
陆海宁. 可隐藏搜索模式的对称可搜索加密方案[J]. 信息网络安全, 2017(1): 38–42. doi: 10.3969/j.issn.1671-1122.2017.01.006LU Haining. Searchable symmetric encryption with hidden search pattern[J]. Netinfo Security, 2017(1): 38–42. doi: 10.3969/j.issn.1671-1122.2017.01.006
|
IBRAIMI L, NIKOVA S, HARTEL P, et al. Public-key encryption with delegated search[C]. The 9th International Conference on Applied Cryptography and Network Security, Nerja, Spain, 2011: 532–549.
|
TANG Qiang, MA Hua, and CHEN Xiaofeng. Extend the concept of public key encryption with delegated search[J]. The Computer Journal, 2015, 58(4): 724–734. doi: 10.1093/comjnl/bxt102
|
WANG Wei, XU Peng, LI Hui, et al. Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts[J]. Future Generation Computer Systems, 2016, 55: 353–361. doi: 10.1016/j.future.2014.07.008
|