[1] |
SONG D, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE. 2000:44-55.
|
[2] |
BONEH D, CRESCENZO G D, OSTROVSKY R. et al. Public Key Encryption with Keyword Search[C]// Advances in Cryptology-EUROCRYPT 2004. Berlin:Springer. 2004:506-522.
|
[3] |
BAEK, SAFAVI-NAINIR, SUSILOW. Public-key Encryption with Keyword Search Revisited[C]// International Conference on Computational Science and Its Applications. Berlin:Springer, 2008:1249-1259.
|
[4] |
ZHAO F M, NISHIDE T, SAKURAI K. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control[C]// International Conference on Information Security and Cryptology-ICISC 2011. Berlin:Springer.2012:406-418.
|
[5] |
CAO N, WANG C, LI M, et al. Privacy-Preserving Multikeyword Ranked Search over Encrypted Cloud Data[J]. IEEE Transactions on Parall and Distributed Systems, 2014, 25(1):222-233.
|
[6] |
RHEE H S, SUSILO W, KIM H J. Secure Searchable Public Key Encryption Scheme against Keyword Guessing Attacks[J]. IEICE Electronics Express, 2009, 6(5):237-243.
|
[7] |
RHEE H S, PARK R H, SUSILO R, et al. Trapdoor Security ina Searchable Public-key Encryption Scheme with a Designated Tester[J]. Journal of Systems & Software, 2010, 83(5):763-771.
|
[8] |
KAUSHIK K, VARADHARAJAN V, NALLUSANY R. Multi-user Attribute Based Searchable Encryption[C]// IEEE 14th International Conference on Mobile Data Management. Piscataway:IEEE.2013:200-205.
|
[9] |
JIANG P, MU Y, GUO F C, et al. Online/offline Ciphertext Retrieval on ResourceConstrained Devices[J]. The Computer Journal, 2016, 59(7):955-969.
|
[10] |
HUANG Q, LI H B. An Efficient Public-key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks[J]. Information Sciences, 2017, 403:1-14.
|
[11] |
YANG L, LI J. Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks[J]. China Communications. 2019, 16(7):156-173.
|
[12] |
陈宁江, 刘灿, 黄汝维, 等. 云环境中抵御内部关键字猜测攻击的快速公钥可搜索加密方案[J]. 电子与信息学报, 2021, 43(2):467-474.
|
|
CHEN Ningjiang, LIU Can, HUANG Ruwei, et al. Fast Public Key Searchable Encryption Scheme Resisting Internal Keyword Guessing Attacks in Cloud Environments[J]. Journal of Electronics & Information Technology, 2021, 43(2):467-474.
|
[13] |
WANG H Y, Li Y, WILLY S, et al. A Fast and Flexible Attribute-based Searchable Encryption Scheme Supporting Multi-search Mechanism in Cloud Computing[J]. Computer Standards & Interfaces, 2022, 82:103635.
|
[14] |
闫玺玺, 赵强, 汤永利, 等. 支持灵活访问控制的多关键字搜索加密方案[J]. 西安电子科技大学学报, 2022, 49(1):55-66.
|
|
YAN Xixi, ZHAO Qiang, TANG Yongli, et al. Multi-keyword Search Encryption Scheme Supporting Flexible Access Control[J]. Journal of Xidian University, 2022, 49(1):55-66.
|
[15] |
王凯文, 王树兰, 王海燕, 等. 一种支持属性撤销的top-k多关键词密文检索方案[J]. 西安电子科技大学学报, 2022, 49(1):26-34.
|
|
WANG Kaiwen, WANG Shulan, WANG Haiyan, et al. Top-k Multi-Keyword Ciphertext Retrieval Scheme Supporting Attribute Revocation[J]. Journal of Xidian University, 2022, 49(1):26-34.
|
[16] |
何雨, 田有亮, 万良, 等. 支持结果验证的多服务器动态可搜索加密方案[J]. 西安电子科技大学学报, 2022, 49(5):189-200.
|
|
HE Yu, TIAN Youliang, WAN Liang, et al. Multi-server Dynamic Searchable Encryption Scheme Supporting Result Verification[J]. Journal of Xidian University, 2022, 49(5):189-200.
|
[17] |
LUO F C, WANG H Y, LIN C, et al. ABAEKS:Attribute-based Authenticated Encryption with Keyword Search Over Outsourced Encrypted Data[J]. IEEE Transactions on Information Forensics and Security, 2023, 18:4970-4983.
|
[18] |
CHEN B W, XIANG T, HE D, et al. BPVSE:Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records[J]. IEEE Transactions on Information Forensics and Security, 2023, 18:3171-3184.
|
[19] |
ZHANG Y H, ZHU T, GUO R, et al. Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data[J]. IEEE Transactions on Cloud Computing, 2023, 11(1):971-983.
|
[20] |
LI H B, HUANG Q, HUANG J Y, et al. Public-Key Authenticated Encryption with Keyword Search Supporting Constant Trapdoor Generation and Fast Search[J]. IEEE Transactions on Information Forensics and Security, 2023, 18:396-410.
|
[21] |
LI J G, SHI Y R, ZHANG Y C. Searchable Ciphertext-policy Attribute-based Encryption with Revocation in Cloud Storage[J]. International Journal of Communication Systems, 2017, 30(1):1-13.
|
[22] |
YIN H, ZHANG J X, XIONG Y Q, et al. CP-ABSE:A Ciphertext-policy Attribute-based Searchable Encryption Scheme[J]. IEEE Access, 2019, 7:5682-5694.
|
[23] |
曹来成, 王玮婷, 康一帆, 等. 属性盲化的模糊可搜索加密云存储方案[J]. 北京理工大学学报, 2019(7):706-713.
|
|
CAO Laicheng, WANG Weiting, KANG Yifan, et al. Fuzzy Searchable Encrypted Cloud Storage Scheme with Attribute Blindness[J]. Transaction of Beijing Institute of Technology, 2019, 39(7):706-713.
|
[24] |
TOMIDA K. A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function[J]. IEICE Technical Report Information & Communication System Security, 2015, 114:175-179.
|
[25] |
施国峰, 张兴兰. 面向云存储的支持范围密文搜索的属性基加密方案[J]. 信息网络安全, 2020, 20(6):75-81.
|
|
SHI Guofeng, ZHANG Xinglan. Attribute-Based Encryption Scheme Supporting Range Ciphertext Search for Cloud Storage[J]. Information Network Security, 2020, 20(6):75-81.
|
[26] |
LI Y, WANG H Y, WANG S L, et al. Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing[C]// 2021 IEEE Conference on Dependable and Secure Computing(DSC). Piscataway:IEEE. 2021:1-8.
|
[27] |
ZENGM, QIAN H, CHEN J et al. Forward Secure Public-key Encryption with Keyword Search for Outsourced Cloud Storage[J]. IEEE Transactions on Cloud Computing, 2022, 10(1):426-438.
|
[28] |
LIN H Y, TZENG W. An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer. 2005:456-466.
|