Citation: | YAN Xixi, FENG Suwei, TANG Yongli, YIN Pei. Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1346-1355. doi: 10.11999/JEIT220207 |
[1] |
SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44–55.
|
[2] |
LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]. 2010 Proceedings IEEE INFOCOM, San Diego, USA, 2010: 1–5.
|
[3] |
WANG Cong, REN Kui, YU Shucheng, et al. Achieving usable and privacy-assured similarity search over outsourced cloud data[C]. 2012 Proceedings IEEE INFOCOM, Orlando, USA, 2012: 441–445.
|
[4] |
KUZU M, ISLAM M S, and KANTARCIOGLU M. Efficient similarity search over encrypted data[C]. The IEEE 28th International Conference on Data Engineering, Washington, USA, 2012: 1156–1167.
|
[5] |
WANG Bing, YU Shucheng, LOU Wenjing, et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]. 2014 IEEE Conference on Computer Communications, Hong Kong, China, 2014: 2112–2120.
|
[6] |
FU Zhangjie, WU Xinle, GUAN Chaowen, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716. doi: 10.1109/TIFS.2016.2596138
|
[7] |
MIAO Yinbin, LIU Ximeng, CHOO K K R, et al. Fair and dynamic data sharing framework in cloud-assisted internet of everything[J]. IEEE Internet of Things Journal, 2019, 6(4): 7201–7212. doi: 10.1109/JIOT.2019.2915123
|
[8] |
LI Huige, ZHANG Fangguo, HE Jiejie, et al. A searchable symmetric encryption scheme using blockchain[EB/OL]. https://doi.org/10.48550/arxiv.1711.01030, 2017.
|
[9] |
YANG Xiaodong, CHEN Guilan, WANG Meiding, et al. Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain[J]. IEEE Access, 2020, 8: 158765–158777. doi: 10.1109/ACCESS.2020.3020841
|
[10] |
周由胜, 陈律君. 基于区块链的细粒度云数据安全存储与删除方案[J]. 电子与信息学报, 2021, 43(7): 1856–1863. doi: 10.11999/JEIT200399
ZHOU Yousheng and CHEN Lüjun. Secure storage and deletion based on blockchain for cloud data with fine-grained access control[J]. Journal of Electronics &Information Technology, 2021, 43(7): 1856–1863. doi: 10.11999/JEIT200399
|
[11] |
QIN Xuanmei, HUANG Yongfeng, YANG Zhen, et al. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing[J]. Journal of Systems Architecture, 2021, 112: 101854. doi: 10.1016/j.sysarc.2020.101854
|
[12] |
NAJAFI A, JAVADI H H S, and BAYAT M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security[J]. Multimedia Tools and Applications, 2021, 80(17): 26049–26068. doi: 10.1007/s11042-021-10844-w
|
[13] |
ZHU Liyan, XIAO Chuqiao, and GONG Xueqing. Keyword search in decentralized storage systems[J]. Electronics, 2020, 9(12): 2041. doi: 10.3390/electronics9122041
|
[14] |
DATAR M, IMMORLICA N, INDYK P, et al. Locality-sensitive hashing scheme based on p-stable distributions[C]. The 20th annual Symposium on Computational Geometry, New York, USA, 2004: 253–262.
|
[15] |
SZABO N. Formalizing and securing relationships on public networks[J]. First Monday, 1997, 2(9): 1–12.
|
[16] |
CHAI Qi and GONG Gong. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]. 2012 IEEE International Conference on Communications, Ottawa, Canada, 2012: 917–922.
|
[17] |
王恺璇, 李宇溪, 周福才, 等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2): 348–360. doi: 10.7544/issn1000-1239.2017.20151125
WANG Kaixuan, LI Yuxi, ZHOU Fucai, et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017, 54(2): 348–360. doi: 10.7544/issn1000-1239.2017.20151125
|
[18] |
CHEN Zhenwei, WU Axin, LI Yifei, et al. Blockchain-enabled public key encryption with multi-keyword search in cloud computing[J]. Security and Communication Networks, 2021, 2021: 66196891. doi: 10.1155/2021/6619689
|
[19] |
FU Shaojing, ZHANG Qi, JIA Nan, et al. A privacy-preserving fuzzy search scheme supporting logic query over encrypted cloud data[J]. Mobile Networks and Applications, 2021, 26(4): 1574–1585. doi: 10.1007/s11036-019-01493-3
|
[20] |
ZHU Xiangyang, DAI Hua, YI Xun, et al. MUSE: An efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data[J]. Security and Communication Networks, 2017, 2017: 1923476. doi: 10.1155/2017/1923476
|