[1] LI Q, MA J F, LI R, et al. Secure, Efficient and Revocable Multi-authority Access Control System in Cloud Storage [J]. Computers and Security, 2016, 59(C): 45-59.
[2] MIAO Y B, MA J F, LIU Z Q. Revocable and Anonymous Searchable Encryption in Multi-user Setting [J]. Concurrency Computation, 2016, 28(4): 1204-1218.
[3] 李昊星, 李风华, 宋承根, 等. 支持多关键字的可搜索公钥加密方案 [J]. 西安电子科技大学学报, 2015, 42(5): 20-25.
LI Haoxing, LI Fenghua, SONG Chenggen, et al. Public Key Encryption with Multi-keywords Search [J]. Journal of Xidian University, 2015, 42(5): 20-25.
[4] CHAI Q, GONG G. Verifiable Symmetric Searchable Encryption for Semi-honest-but-curious Cloud Servers [C]//Proceedings of the IEEE International Conference on Communications. Piscataway: IEEE, 2012: 917-922.
[5] FU Z J, SHU J G, SUN X M, et al. Smart Cloud Search Services: Verifiable Keyword-based Semantic Search over Encrypted Cloud Data [J]. IEEE Transactions on Consumer Electronics, 2014, 60(4): 762-770.
[6] YANG Y, MA M D. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption Function for E-health Clouds [J]. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 746-759.
[7] SUN W H, WANG B, CAO N, et al. Verifiable Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 3025-3035.
[8] SUN W H, LIU X F, LOU W J, et al. Catch You if You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data [C]//Proceedings of the IEEE Conference on Computer Communications: 26. Piscataway: IEEE, 2015: 2110-2118.
[9] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data [C]//Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98.
[10] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-based Encryption [C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. New York: IEEE, 2007: 321-334.
[11] ZHENG Q J, XU S H, ATENIESE G. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data [C]//Proceedings of the IEEE Conference on Computer Communications. Piscataway: IEEE, 2014: 522-530.
[12] SUN W H, YU S C, LOU W J, et al. Protect Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud [J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187-1198. |