[1] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable sym-metric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 79-88.
|
[2] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security &Privacy. 2000: 44-55.
|
[3] |
GOH E J.Secure indexes . Cryptography ePrint archive[R]. 2003.
|
[4] |
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[M]// Applied Cryptography and Network Security. Berlin Heidelberg: SpringerPress, 2015: 442-455.
|
[5] |
BELLOVIN S M , CHESWICK W R . Privacy-enhanced searches using encrypted bloom filters[J].Department of Computer Science Columbia University, 2004.
|
[6] |
AGRAWAL R , KIERNAN J , SRIKANT R ,et al. Order preserving encryption for numeric data[C]// ACM Sigmod. 2004: 563-574.
|
[7] |
WATERS B R , BALFANZ D , DURFEE G ,et al. Building an encrypted and searchable audit log[J].2003.Annual Network & Distributed System Security Symposium, 2003.
|
[8] |
BRINKMAN R , DOUMEN J , JONKER W . Using secret sharing for searching in encrypted data[J]. Lecture Notes in Computer Science, 2004,3178: 18-27.
|
[9] |
DAMIANI E , VIMERCATI S D C , JAJODIA S ,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs[C]// ACM CCS. 2003: 93-102.
|
[10] |
HACIGüMüS H , IYER B R , LI C ,et al. Executing SQL over encrypted data in the database-service-provider model[C]// SIGMOD. 2002: 216-227.
|
[11] |
HACIGüMü? H , IYER B , MEHROTRA S . Efficient execution of aggregation queries over encrypted relational databases[J]. Lecture Notes in Computer Science, 2004,2973: 125-136.
|
[12] |
KANTARCIOGLU M , CLIFTON C . Security issues in querying encrypted data[M]// Data and Applications Security XIX. Berlin Heidelberg: SpringerPress, 2005: 325-337.
|
[13] |
BAO F , DENG R H , DING X ,et al. Private query on encrypted data in multi-user settings[J]. Lecture Notes in Computer Science, 2008,4991: 71-85.
|
[14] |
JARECKI S , JUTLA C , KRAWCZYK H ,et al. Outsourced symmetric private information retrieval[C]// ACM Sigsac Conference on Computer & Communications Security. 2013: 875-888.
|
[15] |
KATZ J , SAHAI A , WATERS B . Predicate encryption supporting disjunctions,polynomial equations,and inner products[J]. Journal of Cryptology, 2008: 191-224.
|
[16] |
CASH D , JARECKI S , JUTLA C ,et al. Highly-scalable searchable symmetric encryption with support for boolean queries[M]// Advances in Cryptology-CRYPTO 2013. Berlin Heidelberg: SpringerPress, 2013: 353-373.
|
[17] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[J]. Infocom, 2012,3(9): 1-5.
|
[18] |
BRINGER J,CHABANNE , KINDARJI B . Error-tolerant searchable encryption[C]// IEEE International Conference on Communications. 2009: 1-6.
|
[19] |
LIU Z , MA H , LI J ,et al. Secure storage and fuzzy query over encrypted databases[C]// International Conference on Network and System Security. 2013: 439-450.
|
[20] |
NEPOLEAN D , KARTHIK I , PREETHI MU ,et al. Privacy pre-serving ranked keyword search over encrypted cloud data[M]// Recent Trends in Computer Networks and Distributed Systems Security. Berlin Heidelberg: SpringerPress, 2014: 396-403.
|
[21] |
WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[C]// IEEE International Conference on Distributed Computing Systems,IEEE Computer Society. 2010: 253-262.
|
[22] |
WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2012,23(8): 1467-1479.
|
[23] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(1): 222-233.
|
[24] |
LU Y , . Privacy-preserving logarithmic-time search on encrypted data in cloud[C]// NDSS. 2012.
|
[25] |
BOLDYREVA A , CHENETTE N , LEE Y ,et al. Order-preserving symmetric encryption[C]// The International Conference on the Theory and Applications of Cryptographic Techniques. 2009: 224-241.
|
[26] |
CHASE M , KAMARA S . Structured encryption and controlled disclosure[M]// Advances in Cryptology-ASIACRYPT 2010. Berlin Heidelberg: SpringerPress, 2010: 577-594.
|
[27] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// ACM Conference on Computer &Communications Security. 2015: 965-976.
|
[28] |
KAMARA S , PAPAMANTHOU C . Parallel and dynamic searchable symmetric encryption[M]// Financial Cryptography and Data Security. Berlin Heidelberg: SpringerPress, 2013: 258-274.
|
[29] |
CASH D , JAEGER J , JARECKI S ,et al. Dynamic searchable encryption in very-large databases:data structures and implementation[C]// Network and Distributed System Security Symposium. 2014.
|
[30] |
HAHN F , KERSCHBAUM F . Searchable encryption with secure and efficient updates[C]// ACM CCS. 2014: 310-320.
|
[31] |
DAN B , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[M]// Advances in Cryptology Eurocrypt. Berlin Heidelberg: SpringerPress, 2003: 506-522.
|
[32] |
ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J]. Journal of Cryptology, 2008,21(3): 350-391.
|
[33] |
BALLARD L , KAMARA S , MONROSE F . Achieving efficient conjunctive keyword searches over encrypted data[C]// Interna tional Conference on Information and Communications Security. 2005: 414-426.
|
[34] |
BAEK J , SAFAVINAINI R , SUSILO W . Public key encryption with keyword search revisited[M]// Computational Science and Its Applications–ICCSA. 2008: 1249-1259.
|
[35] |
GOLLE P , STADDON J , WATERS B R . Secure conjunctive keyword search over encrypted data[J]. Lecture Notes in Computer Science, 2004,3089: 31-45.
|
[36] |
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[M]// Pairing-Based Cryptography – Pairing 2007. Berlin Heidelberg: SpringerPress, 2007: 2-22.
|
[37] |
DONG J P , KIM K , LEE P J . Public key encryption with conjunctive field keyword search[J]. Lecture Notes in Computer Science, 2004,3325: 73-86.
|
[38] |
RYU E K , TAKAGI T . Efficient conjunctive keyword-searchable encryption[C]// The International Conference on Advanced Information Networking and Applications Workshops,IEEE Computer Society. 2007: 409-414.
|
[39] |
BETHENCOURT J , CHAN H , PERRIG A ,et al. Anonymous multi-attribute encryption with range query and conditional decryption[C]. IEEE Symposium on Security & Privacy. 2006.
|
[40] |
SHI E , BETHENCOURT J , CHAN T H ,et al. Multi-dimensional range query over encrypted data[J]. IEEE Computer Society, 2007: 350-364.
|
[41] |
DAN B , WATERS B . Conjunctive,subset,and range queries on encrypted data[C]// The Theory of Cryptography Conference. 2006 535-554.
|
[42] |
DAVIS D , MONROSE F , REITER M K . Time-scoped searching of encrypted audit logs[C]// The International Conference on Information and Communications Security(ICICS). 2004: 532-545.
|
[43] |
CHEUNG D W , MAMOULIS N , WONG W K ,et al. Anonymous fuzzy identity-based encryption for similarity search[C]// International Symposiumon Algorithms and Computation. 2010: 61-72.
|
[44] |
SEDGHI S , LIESDONK P V , NIKOVA S ,et al. Searching keywords with wildcards on encrypted data[C]// The International Conference on Security and Cryptography for Networks. 2010: 138-153.
|
[45] |
LUAN I , NIKOVA S , HARTEL P ,et al. Public-key encryption with delegated search[M]// Applied Cryptography and Network Security. Berlin Heidelberg: SpringerPress, 2011: 532-549.
|
[46] |
YANG G , TAN C H , HUANG Q ,et al. Probabilistic public key encryption with equality test[C]// The International Conference on Topics in Cryptology. 2010: 119-131.
|
[47] |
ARRIAGA A , TANG Q , RYAN P . Trapdoor privacy in asymmetric searchable encryption schemes[M]// Progress in Cryptology–AFRICACRYPT 2014. Springer International Publishing, 2014: 31-50.
|
[48] |
CAMENISCH J , KOHLWEISS M , RIAL A ,et al. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data[C]// The International Conference on Practice and Theory in Public Key Cryptography. 2009: 196-214.
|
[49] |
BYUN J W , LEE D H , LIM J . Efficient conjunctive keyword search on encrypted data storage system[C]// European Conference on Public Key Infrastructure:Theory and Practice. 2006: 184-196.
|
[50] |
JEONG I R , KWON J O , HONG D ,et al. Constructing PEKS schemes secure against keyword guessing attacks is possible?[J]. Computer Communications, 2009,32(2): 394-396.
|
[51] |
FANG L , SUSILO W , GE C ,et al. A secure channel free public key encryption with keyword search scheme without random oracle[C]// The International Conference on Cryptology and Network Security. 2009: 248-258.
|
[52] |
TANG Q , CHEN L . Public-key encryption with registered keyword search[C]// European Workshop on Public Key Infrastructures,Services and Applications. 2009: 163-178.
|
[53] |
HARROWER W . Searching encrypted data[R]. 2009.
|
[54] |
XU P , JIN H , WU Q ,et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277.
|
[55] |
BELLARE M , BOLDYREVA A,O’NEILL A . Deterministic and efficiently searchable encryption[M]// Advances in Cryptology CRYPTO 2007. Berlin Heidelberg : SpringerPress, 2007: 535-552.
|
[56] |
BELLARE M , BOLDYREVA A,O’NEILL A . Deterministic and efficiently searchable encryption[C]// The International Cryptology Conference on Advances in Cryptology. 2006: 535-552.
|
[57] |
BOLDYREVA A , FEHR S,O’NEILL A . On notions of security for deterministic encryption,and efficient constructions without random oracles[C]// Conference on Cryptology:Advances in Cryptology. 2008: 335-359.
|
[58] |
BRAKERSKI Z , SEGEV G . Better security for deterministic public-key encryption:the auxiliary-input setting[M]// Advances in Cryptology-CRYPTO 2011. Berlin Heidelberg: SpringerPress, 2011: 543-560.
|
[59] |
XU P , WU Q , WANG W ,et al. Generating searchable public-key ciphertexts with hidden structures for fast keyword search[J]. IEEE Transactions on Information Forensics & Security, 2015,10(9):1.
|
[60] |
BOYEN X , WATERS B . Anonymous hierarchical identity-based encryption (without random oracles)[C]// The International Conference on Advances in Cryptology. 2006: 290-307.
|
[61] |
ABDALLA M , CATALANO D , FIORE D . Verifiable random functions:relations to identity-based key encapsulation and new constructions[J]. Journal of Cryptology, 2014,27(3): 544-593.
|