[1] LIANG K, SUSILO W. Searchable Attribute-based Mechanism with Efficient Data Sharing for Secure Cloud Storage [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1981-1992.
[2] SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data [C]//Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway: IEEE, 2000: 44-55.
[3] BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public Key Encryption with Keyword Search [C]//Lecture Notes in Computer Science: 3027. Berlin: Springer Verlag, 2004: 506-522.
[4] MIAO Y B, MA J F, LIU Z Q. Revocable and Anonymous Searchable Encryption in Multi-user Setting [J]. Concurrency Computation, 2016, 28(4): 1204-1218.
[5] XU P, JIN H, WU Q H, et al. Public Key Encryption with Fuzzy Keyword Search: a Provable Secure Scheme under Keyword Guessing Attacks [J]. IEEE Transactions on Computers, 2013, 62(11): 2266-2277.
[6] GUO L F, YAU W C. Efficient Secure-channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage [J]. Journal of Medical Systems, 2015, 39(2): 1-11.
[7] 李昊星, 李风华, 宋承根, 等. 支持多关键字的可搜索公钥加密方案 [J]. 西安电子科技大学学报, 2015, 42(5): 20-25.
LI Haoxing, LI Fenghua, SONG Chenggen, et al. Public Key Encryption with Multi-keywords Search [J]. Journal of Xidian University, 2015, 42(5): 20-25.
[8] HWANG Y H, LEE P J. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System [C]//Lecture Notes in Computer Science: 4575. Heidelberg: Springer Verlag, 2007: 2-22.
[9] WANG P S, WANG H X, PIEPRZYK J. Keyword Field-free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups [C]//Lecture Notes in Computer Science: 5339. Heidelberg: Springer Verlag, 2008: 178-195.
[10] ZHANG B, ZHANG F G. An Efficient Public Key Encryption with Conjunctive-subset Keywords Search [J]. Journal of Network and Computer Applications, 2011, 34(1): 262-267.
[11] SUN W H, WANG B, CAO N, et al. Verifiable Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 3025-3035.
[12] SUN W H, LIU X F, LOU W J, et al. Catch you if you lie to me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data [C]//Proceedings of the 2015 IEEE Conference on Computer Communication: 26. Piscataway: IEEE, 2015: 2110-2118. |