[1] |
CURTMOLA R, GARAY J, KAMARA S, et al. Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions[J]. Journal of Computer Security, 2011,19(5):895-934.
|
[2] |
KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic Searchable Symmetric Encryption [C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York: ACM, 2012: 965-976.
|
[3] |
CASH D, JAEGER J, JARECKI S, et al. Dynamic Searchable Encryption in Very-large Databases: Data Structures and Implementation [C]//Proceedings of 2014 Network and Distributed System Security Symposium. Piscataway: IEEE, 2014: 23-26.
|
[4] |
WILKINSON S, BOSHEVSKI T, BRANDOF J, et al. Storj: a Peer-to-peer Cloud Storage Network[EB/OL]. [2020-03-26]. https://storj.io/storjv2.pdf.
|
[5] |
PRZYDATEK B, SONG D, PERRIG A. Sia: Secure Information Aggregation in Sensor Networks [C]//Proceedings of the First International Conference on Embedded Networked Sensor Systems. New York: ACM, 2003: 255-265.
|
[6] |
Protocol Labs. Filecoin: a decentralized storage network[EB/OL].[2020-03-26]. https://ipfser.org/2019/08/16/filecoin-a-decentralized-storage-network-3/.
|
[7] |
HU S, CAI C, WANG Q, et al. Searching an Encrypted Cloud Meets Mlockchain: A Decentralized, Reliable and Fair Realization [C]//Proceedings of the 2018 IEEE INFOCOM. Piscataway: IEEE, 2018: 792-800.
|
[8] |
CAI C J, WENG J, YUAN X L, et al. Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness[J]. IEEE Transactions on Dependable and Secure Computing, 2018, DOI: 10.1109/TDSC.2018.2877332.
doi: 10.1109/TDSC.2012.11
pmid: 24489520
|
[9] |
CLARKE D, DEVADAS S, VAN DIJK M, et al. Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking [C]//Lecture Notes in Computer Science: 2894. Heidelberg: Springer Verlag, 2003: 188-207.
|
[10] |
NAKAMOTO S. Bitcoin: a Peer-to-peer Electronic Cash System[EB/OL]. [2020-03-26]. https://bitcoin.org/bitcoin.pdf.
|
[11] |
WOOD G. et al. Ethereum: a Secure Decentralised Generalised Transaction Ledger[J]. Ethereum Project Yellow Paper, 2014,151(2014):1-32.
|
[12] |
YAO J, ZHENG Y, GUO Y, et al. A Privacy Preserving System for Targeted Coupon Service[J]. IEEE ACCESS, 2019,7:120817-120830.
|
[13] |
WILKINSON S, LOWRY J. Metadisk a blockchain-based decentralized file storage application[EB/OL]. [2020-03-26]. https://storj.io/metadisk.pdf.
|
[14] |
BOST R. Sophos: Forward Secure Searchable Encryption [C]//Proceedings of the 2016 23rd ACM Conference on Computer and Communications Security. New York: ACM , 2016: 1143-1154.
|
[15] |
BOST R, MINAUD B, OHRIMENKO O. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [C]//Proceedings of the 2017 ACM Conference on Computer and Communications Security. New York: ACM, 2017: 1465-1482.
|
[16] |
KIM K S, KIM M, LEE D, et al. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates [C]//Proceedings of the 2017 ACM Conference on Computer and Communications Security. New York: ACM, 2017: 1449-1463.
|
[17] |
GUO Y, YUAN X, WANG X, et al. Enabling Encrypted Rich Queries in Distributed Key-value Stores[J]. IEEE Transactions on Parallel and Distributed Systems, 2019,30(6):1283-1297.
|
[18] |
WANG Q, GUO Y, HUANG H, et al. Multi-user Forward Secure Dynamic Searchable Symmetric Encryption [C]//Lecture Notes in Computer Science: 11058. Heidelberg:Springer Verlag, 2018: 125-140.
|
[19] |
YUAN X, GUO Y, WANG X, et al. Enckv: An Encrypted Key-value Store with Rich Queries [C]//Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. New York: ACM, 2017: 423-435.
|
[20] |
LI H, TIAN H, ZHANG F, et al. Blockchain-based Searchable Symmetric Encryption Scheme[J]. Computers and Electrical Engineering, 2019,73:32-45.
|
[21] |
PRENEEL B, GOVAERTS R, VANDEWALLE J. Hash Functions Based on Block Ciphers: a Synthetic Approach [C]//Lecture Notes in Computer Science: 773. Heidelberg: Springer Verlag, 1994: 368-378.
|
[22] |
BLUM M, MICALI S. How to Generate Cryptographically Strong Sequence of Pseudo-random Bits[J]. SIAM Journal on Computing, 1984,13(4):850-864.
|