[1] |
李经纬, 贾春福, 刘哲理 , 等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128.
|
|
LI J W , JIA C F , LIU Z L , et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128.
|
[2] |
ZHENG Q , XU S , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]// IEEE Conference on Computer Communications. 2014: 522-530.
|
[3] |
SUN W , YU S , LOU W , et al. Protecting your right:attribute-based keyword search with fine-grained owner-enforced search authoriza-tion in the cloud[C]// IEEE Conference on Computer Communica-tions. 2014: 226-234.
|
[4] |
JIN W B , RHEE H S , PARK H , et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted da-ta[C]// The Third VLDB Workshop Secure Data Management. 2006: 75-83.
|
[5] |
FANG L , SUSILO W , GE C , et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Sciences an International Journal, 2013,238(7): 221-241.
|
[6] |
WANG C H , TU T Y . Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server[J]. Journal of Shanghai Jiaotong University (Science), 2014,19(4): 440-442.
|
[7] |
LI C T , LEE C W , SHEN J J . An extended chaotic maps-based keyword search scheme over encrypted data resist outside and in-side keyword guessing attacks in cloud storage services[J]. Nonli-near Dynamics, 2015,80(3): 1601-1611.
|
[8] |
林鹏, 江颉, 陈铁明 . 云环境下关键词搜索加密算法研究[J]. 通信学报, 2015,36(s1): 259-265.
|
|
LIN P , JIANG J , CHEN T M . Application of keyword searchable encryption in cloud[J]. Journal of Communications, 2015,36(s1): 259-265.
|
[9] |
CHEN R , MU Y , YANG G , et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics & Security, 2016,11(4): 789-798.
|
[10] |
QIU S , LIU J , SHI Y , et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J]. Science China Information Sciences, 2017,60(5).
|
[11] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// The Second International Confe-rence on Applied Cryptography and Network Security(ACNS 2004). 2004: 31-45.
|
[12] |
ZHANG B , ZHANG F . An efficient public key encryption with conjunctive subset keywords search[J]. Journal of Network &Computer Applications, 2011,34(1): 262-267.
|
[13] |
YANG Y , MA M . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds[J]. IEEE Transactions on Information Forensics & Security, 2016,11(4): 746-759.
|
[14] |
宋衍, 韩臻, 陈栋 , 等. 支持关键词任意连接搜索的属性加密方案[J]. 通信学报, 2016,37(8): 77-85.
|
|
SONG Y , HAN Z , CHEN D , et al. Attribute-based encryption supporting arbitrary conjunctive key word search[J]. Journal of Communications, 2016,37(8): 77-85.
|
[15] |
DONG Q , GUAN Z , CHEN Z . Attribute-based keyword search efficiency enhancement via an online/offline approach[C]// The In-ternational Conference on Parallel and Distributed Systems. 2015: 298-305.
|
[16] |
HOHENBERGER S , WATERS B . Online/offline attribute-based encryption[C]// Public Key Cryptography (PKC 2014). 2014: 293-310.
|
[17] |
陈冬冬, 曹珍富, 董晓蕾 . 在线/离线密文策略属性基可搜索加密[J]. 计算机研究与发展, 2016,53(10): 2365-2375.
|
|
CHEN D D , CAO Z F , DONG X L . Online/offline ciphertext policy attribute-base searchable encryption[J]. Journal of Computer Research and Development, 2016,53(10): 2365-2375.
|
[18] |
WATERS B . Ciphertext-policy attribute-based encryption:an ex-pressive,efficient,and provably secure realization[C]// Public Key Cryptography(PKC 2011). 2011: 53-70.
|
[19] |
WU Y , LU X , SU J , et al. An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system[J]. Journal of Medical Systems, 2016,40(12): 258.
|