[1] REN Y J, SHEN J, WANG J, et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage [J]. Journal of Internet Technology, 2015, 16(2): 317-323.
[2] BOSCH C, PETER A, LEENDERS B, et al. Distributed Searchable Symmetric Encryption [C]//Proceedings of the 2014 12th Annual Conference on Privacy, Security and Trust. Piscataway: IEEE, 2014: 330-337.
[3] SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data [C]//Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway: IEEE, 2000: 44-55.
[4] MIAO Y B, MA J F, LIU Z Q. Revocable and Anonymous Searchable Encryption in Multi-user Setting [J]. Concurrency and Computation: Practice and Experience, 2016, 28(4): 1204-1218.
[5] BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public Key Encryption with Keyword Search [C]//Lecture Notes in Computer Science: 3027. Heidelberg: Springer Verlag, 2004: 506-522.
[6] LI J, WANG Q, WANG C, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing [C]//Proceedings of the 29th IEEE International Conference on Computer Communications. Piscataway: IEEE, 2010: 441-445.
[7] MOATAZ T, JUSTUS B, RAY I, et al. Privacy-preserving Multiple Keyword Search on Outsourced Data in the Clouds [C]//Lecture Notes in Computer Science: 8566. Heidelberg: Springer Verlag, 2014: 66-81.
[8] 李昊星, 李凤华, 宋承根, 等. 支持多关键字的可搜索公钥加密方案 [J]. 西安电子科技大学学报, 2015, 42(5): 20-25.
LI Haoxing, LI Fenghua, SONG Chenggen, et al. Public Key Encryption with Multi-keywords Search [J]. Journal of Xidian University, 2015, 42(5): 20-25.
[9] ZHENG Q, LI X, AZGIN A. CLKS: Certificateless Keyword Search on Encrypted Data [C]//Lecture Notes in Computer Science: 9408. Heidelberg: Springer Verlag, 2015: 239-253.
[10] YANG Y, MA M D. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds [J]. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 746-759.
[11] MIAO Y B, MA J F, WEI F S, et al. Verifiable Conjunctive Keywords Search over Encrypted Data without Secure-channel [J]. Peer-to-Peer Networking and Applications, 2016: 1-13.
[12] CHEN Y C, TSO R, SUSILO W, et al. Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes [J]. IACR Cryptology ePrint Archive, 2013, 193(2013): oai:CiteSeerX.psu:10.1.1.301.1370. |