Citation: | HUANG Haiping, DU Jianpeng, DAI Hua, WANG Ruchuan. Multi-sever Multi-keyword Searchable Encryption Scheme Based on Cloud Storage[J]. Journal of Electronics & Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338 |
SONG X D, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44-55.
|
BONEH D and FRANKLIN M. Identity-based encryption from the weil pairing[C]. Advances in Cryptology-CRYPTO 2001-21st Annual International Cryptology Conference, California, USA, 2001: 213-229.
|
BONEH D, CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]. Proceedings of EUROCRYPT 2004, Interlaken, Switzerland, 2004: 506-522.
|
KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. CCS 2012 19th ACM Conference on Computer and Communications Security, Raleigh, USA, 2012: 965-976.
|
RHEE H S, PARK J H, SUSILO W, et al. Improved searchable public key encryption with designated tester[C]. ASIACCS09 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 376-379.
|
HU C and LIU P. A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension[C]. Communications in Computer and Information Science, Jinan, China, 2011: 131-136.
|
ZIRTOL KOBRA AMIRI, NOROOZI MAHNAZ, and ESLAMI ZIBA. Multi-user searchable encryption scheme with general access structure[C]. 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 2015: 399-404.
|
LI J, LI J, CHEN X, et al. Privacy-Preserving data utilization in hybrid clouds[J]. Future Generation Computer Systems, 2014, 30(1): 98-106. doi: 10.1016/j.future.2013.06.011.
|
CUI B, LIU Z, and WANG L. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage[J]. IEEE Transactions on Computers, 2015, 65(8): 2374-2385. doi: 10.1109/TC.2015.2389959.
|
PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100-113. doi: 10.1109 /CC.2014.7004528.
|
GOLLE P, STADDON J, and WATERS B. Secure conjunctive keyword search over encrypted data[C]. International Conference on Applied Cryptography and Network Security, Huangshan, China, 2004: 31-45.
|
YANG Yang, MA Maode, and LIN Bogang. Proxy re-encryption conjunctive keyword search against keyword guessing attack[C]. Computing, Communications and IT Applications Conference (ComComAp), Hong Kong, China, 2013: 125-130.
|
KERSCHBAUM F. Secure conjunctive keyword searches for unstructured text[C]. International Conference on Network and System Security, Milan, Italia, 2011: 285-289.
|
XIA Zhihua, WANG Xinhui, SUN Xingming, el al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. doi: 10.1109/ TPDS.2015.2401003.
|