[1] |
SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy.S&P 2000.Piscataway:IEEE, 2000:44-55.
|
[2] |
GOH E J. Secure Indexes (2003)[J/OL]. [2003-10-07]. https://eprint.iacr.org/2003/216.
|
[3] |
CAO N, WANG C, LI M, et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):222-233.
doi: 10.1109/TPDS.2013.45
|
[4] |
MIAO Y, MA J, LIU X, et al. Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing[J]. IEEE Internet of Things Journal, 2018, 5(4):3008-3018.
doi: 10.1109/JIOT.2017.2779124
|
[5] |
SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]// Advances in Cryptoloty-EUROCRYPT 2005. New York: ACM, 2005,457-473.
|
[6] |
ZHAO Y, REN M, JIANG S, et al. An Efficient and Revocable Storage CP-ABE Scheme in the Cloud Computing[J]. Computing, 2019, 101(8):1041-1065.
doi: 10.1007/s00607-018-0637-2
|
[7] |
WATERS B. Ciphertext-Policy Attribute-Based Encryption (2011)[J/OL]. [2011-12-31]. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=07869BBF42253321C865E1EE1EFC6FC2?doi=10.1.1.119.2179&rep=rep1&type=pdf.
|
[8] |
JUNBEOM H. Improving Security and Efficiency in Attribute-Based Data Sharing[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(10):2271-2282.
doi: 10.1109/TKDE.2011.78
|
[9] |
CHEN N, LI J, ZHANG Y, et al. Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage[J]. IEEE Transactions on Computers, 2020 ( Early Access ):1-11.
|
[10] |
HUI C, DENG R H, LAI J, et al. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures,Revisited[J]. Computer Networks, 2018, 133:157-165.
doi: 10.1016/j.comnet.2018.01.034
|
[11] |
GENTRY C. A Fully Homomorphic Encryption Scheme[M]. Stanford: Stanford University, 2009:1-209.
|
[12] |
COMINETTI E L, SIMPLICIO M A. Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem[J]. IEEE Transactions on Information Forensics and Security, 2020, 15:2988-2998.
doi: 10.1109/TIFS.2020.2981239
|
[13] |
孙霓刚, 朱浩然, 汪伟昕. 一种适用于n bit的整数上全同态加密方案[J]. 计算机应用研究, 2018, 35(4):1179-1181.
|
|
SUN Nigang, ZHU Haoran, WANG Weixin. Fully Homomorphic Encryption Scheme Applied to n bit[J]. Application Research of Computers, 2018, 35(4):1179-1181.
|
[14] |
DUMAIS S T. Latent Semantic Analysis[J]. Annual Review of Information Science & Technology, 2013, 4(6):683-692.
|
[15] |
ZHU Z, LIANG J, LI D, et al. Hot Topic Detection Based on a Refined TF-IDF Algorithm[J]. IEEE Access, 2019, 7:26996-27007.
doi: 10.1109/ACCESS.2019.2893980
|
[16] |
SUN J, REN L, WANG S, et al. Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage[J]. IEEE Access, 2019, 7:66655-66667.
doi: 10.1109/ACCESS.2019.2917772
|
[17] |
CAO L, KANG Y, WU Q, et al. Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding[J]. China Communications, 2020, 17(6):153-163.
doi: 10.23919/JCC.2020.06.013
|
[18] |
BOUCENNA F, NOUALI O, KECHID S, et al. Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management[J]. Journal of Computer Science and Technology, 2019, 34(1):133-154.
doi: 10.1007/s11390-019-1903-2
|
[19] |
李涵, 张晨, 黄荷姣, 等. 一种支持前向安全更新和验证的加密搜索算法[J]. 西安电子科技大学学报, 2020, 47(5):48-56.
|
|
LI Han, ZHANG Chen, HUANG Hejiao, et al. Algorithm for Encrypted Search with Forward Secure Updates and Verification[J]. Journal of Xidian University, 2020, 47(5):48-56.
|
[20] |
ZHOU Y, ZHENG S, WANG L. Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud[J]. Cryptography, 2020, 4(4):28.
doi: 10.3390/cryptography4040028
|