[1] |
SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy.S&P 2000. Piscataway: IEEE, 2000:44-55.
|
[2] |
GOH E J. Secure Indexes[J]. IACR Cryptology ePrint Archive, 2003, 2003:216.
|
[3] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions[C]// The 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006:79-88.
|
[4] |
CHANG Y C, MITZENMACHER M. Privacy Preserving Keyword Searches on Remote Encrypted Data[C]// International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2005:442-455.
|
[5] |
FU Z, WU X, GUAN C, et al. Toward Efficient Multi-Keyword Fuzzy Search over Encrypted Outsourced Data with Accuracy Improvement[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12):2706-2716.
doi: 10.1109/TIFS.2016.2596138
|
[6] |
CONG W, REN K, YU S, et al. Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data[C]// IEEE INFOCOM. Piscataway: IEEE, 2012:451-459.
|
[7] |
BALLARD L, KAMARA S, MONROSE F. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]// International Conference on Information and Communications Security. Berlin: Springer, 2005:414-426.
|
[8] |
闫玺玺, 赵强, 汤永利, 等. 支持灵活访问控制的多关键字搜索加密方案[J]. 西安电子科技大学学报, 2022, 49(1):55-66.
|
|
YAN Xixi, ZHAO Qiang, TANG Yongli, et al. Multi-Keyword Search Encryption Scheme Supporting Flexible Access Control[J]. Journal of Xidian University, 2022, 49(1):55-66.
|
[9] |
GOLLE P, STADDON J, WATERS B. Secure Conjunctive Keyword Search over Encrypted Data[C]// International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2004:31-45.
|
[10] |
CASH D, GRUBBS P, PERRYE J, et al. Leakage-Abuse Attacks Against Searchable Encryption[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2015:668-679.
|
[11] |
JIN L, QIAN W, CONG W, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]// IEEE INFOCOM. Piscataway: IEEE, 2010:441-445.
|
[12] |
王恺璇, 李宇溪, 周福才, 等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2):348-360.
|
|
WANG Kaixuan, LI Yuxi, ZHOU Fucai, et al. Multi-Keyword-Oriented Fuzzy Ciphertext Search Method[J]. Journal of Computer Research and Development, 2017, 54(2):348-360.
|
[13] |
BOSCH C, PETER A, LEENDERS B, et al. Distributed Searchable Symmetric Encryption[C]// 2014 Twelfth Annual International Conference on Privacy,Security and Trust. Piscataway: IEEE, 2014:330-337.
|
[14] |
ISHAI Y, KUSHILEVITZ E, LU S, et al. Private Large-Scale Databases with Distributed Searchable Symmetric Encryption[C]// Cryptographers’ Track at the RSA Conference. Berlin: Springer, 2016:90-107.
|
[15] |
ORENCIK C, SELCUK A, SAVAS E, et al. Multi-Keyword Search over Encrypted Data with Scoring and Search Pattern Obfuscation[J]. International Journal of Information Security, 2016, 15(3):251-269.
doi: 10.1007/s10207-015-0294-9
|
[16] |
ZHANG W, LIN Y, XIAO S, et al. Secure Distributed Keyword Search in Multiple Clouds[C]// 2014 IEEE 22nd International Symposium of Quality of Service. Piscataway: IEEE, 2014:370-379.
|
[17] |
POH G S, MOHAMAD M S, CHIN J J. Searchable Symmetric Encryption over Multiple Servers[J]. Cryptography and Communications, 2018, 10(1):139-158.
doi: 10.1007/s12095-017-0232-y
|
[18] |
ZHANG C, FU S, AO W. A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage[C]// International Symposium on Cyberspace Safety and Security. Berlin: Springer, 2019:585-600.
|
[19] |
杜瑞忠, 王一, 田俊峰. 一种支持动态可验证的密文检索方案[J]. 西安电子科技大学学报, 2022: 49(1):35-46.
|
|
DU Ruizhong, WANG Yi, TIAN Junfeng. A Ciphertext Search Scheme Supporting Dynamic and Verifiable[J]. Journal of Xidian University, 2022, 49(1):35-46.
|
[20] |
ZHANG Y, DENG R H, SHU J, et al. TKSE:Trustworthy keyword Search over Encrypted Data with Two-Side Verifiability Via Blockchain[J]. IEEE Access, 2018, 6:31077-31087.
doi: 10.1109/ACCESS.2018.2844400
|
[21] |
WANG S, ZHANG Y, ZHANG Y. A Blockchain-Based Framework for Data Sharing with Fine-Grained Access Control in Decentralized Storage Systems[J]. IEEE Access, 2018, 6:38437-38450.
doi: 10.1109/ACCESS.2018.2851611
|
[22] |
LI H, TIAN H, ZHANG F, et al. Blockchain-Based Searchable Symmetric Encryption Scheme[J]. Computers & Electrical Engineering, 2019, 73:32-45.
|
[23] |
SHAMIR A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11):612-613.
doi: 10.1145/359168.359176
|
[24] |
SZABO N. Formalizing and Securing Relationships on Public Networks[J]. First Monday, 1997, 2(9):1-21.
|