[1] |
BONEH D , DI CRESCENZO G , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522.
|
[2] |
YANG G , TAN C H , HUANG Q ,et al. Probabilistic public key encryption with equality test[C]// Cryptographers’ Track at the RSA Conference. 2010: 119-131.
|
[3] |
YONG H H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]// International Conference on Pairing-Based Cryptography. 2007: 2-22.
|
[4] |
ZHAO F , NISHIDE T , SAKURAI K . Multi-user keyword search scheme for secure data sharing with fine-grained access control[C]// International Conference on Information Security and Cryptology. 2011: 406-418.
|
[5] |
KIAYIAS A , OKSUZ O , RUSSELL A ,et al. efficient encrypted keyword search for multi-user data sharing[M]. Computer Security-ESORICS 2016. 2016: 173-195.
|
[6] |
LI Z , ZHAO M , JIANG H ,et al. Multi-user searchable encryption with a designated server[J]. Annals of Telecommunications, 2017,72(9/10): 1-13.
|
[7] |
HUANG K , CHEN Y C , TSO R . Semantic secure public key encryption with filtered equality test PKE-FET[C]// 12th International Joint Conference on e-Business and Telecommunications (ICETE). 2015,4: 327-334.
|
[8] |
HUANG K , TSO R , CHEN Y C . Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption[J]. Journal of Computer and System Sciences, 2017,89: 400-409.
|
[9] |
TANG Q , . Towards public key encryption scheme supporting equality test with fine-grained authorization[C]// Australasian Conference on Information Security and Privacy. 2011: 389-406.
|
[10] |
TANG Q . Public key encryption supporting plaintext equality test and user specified authorization[J]. Security and Communication Networks, 2012,5(12): 1351-1362.
|
[11] |
TANG Q . Public key encryption schemes supporting equality test with authorisation of different granularity[J]. International Journal of Applied Cryptography, 2012,2(4): 304-321.
|
[12] |
MA S , ZHANG M , HUANG Q ,et al. Public key encryption with delegated equality test in a multi-user setting[J]. The Computer Journal, 2015,58(4): 986-1002.
|
[13] |
HUANG K , TSO R , CHEN Y C ,et al. PKE-AET:public key encryption with authorized equality test[J]. The Computer Journal, 2015,58(10): 2686-2697.
|
[14] |
MA S , HUANG Q , ZHANG M ,et al. Efficient public key encryption with equality test supporting flexible authorization[J]. IEEE Transactions on Information Forensics and Security, 2015,10(3): 458-470.
|
[15] |
XU Y , WANG M , ZHONG H ,et al. Verifiable public key encryption scheme with equality test in 5G networks[J]. IEEE Access, 2017,5: 12702-12713.
|
[16] |
MA S . Identity-based encryption with outsourced equality test in cloud computing[J]. Information Sciences, 2016,328: 389-402.
|
[17] |
WU L , ZHANG Y , CHOO K K R ,et al. Efficient and secure identity-based encryption scheme with equality test in cloud computing[J]. Future Generation Computer Systems, 2017,73: 22-31.
|
[18] |
QU H , YAN Z , LIN X J ,et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018,462: 76-92.
|
[19] |
ZHU H , WANG L , AHMAD H ,et al. Key-policy attribute-based encryption with equality test in cloud computing[J]. IEEE Access, 2017,5: 20428-20439.
|
[20] |
WANG Q , PENG L , XIONG H ,et al. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing[J]. IEEE Access, 2018,6: 760-771.
|
[21] |
LIAO Y , CHEN H , LI F ,et al. Insecurity of a key-policy attribute based encryption scheme with equality test[J]. IEEE Access, 2018,6: 10189-10196.
|
[22] |
CUI Y , HUANG Q , HUANG J ,et al. Ciphertext-policy attribute-based encrypted data equality test and classification[J]. Cryptology ePrint Archive, 2018.
|
[23] |
CUI Y , HUANG Q , HUANG J ,et al. Outsourced ciphertext-policy attribute-based encryption with equality test[C]// Proceedings of Inscrypt,Lecture Notes in Computer Science.Springer. 2018.
|
[24] |
LEE H T , LING S , SEO J H ,et al. Public key encryption with equality test in the standard model[J]. IACR Cryptology ePrint Archive, 2016:1182.
|
[25] |
吴黎兵, 张宇波, 何德彪 . 云计算中基于身份的双服务器密文等值判定协议[J]. 计算机研究与发展, 2017,54(10): 2232-2243.
|
|
WU L B , ZHANG Y B , HE D B . Dual server identity-based encryption with equality test for cloud computing[J]. Journal of Computer Research and Development, 2017,54(10): 2232-2243.
|
[26] |
LIN X J , SUN L , QU H . Generic construction of public key encryption,identity-based encryption and signcryption with equality test[J]. Information Sciences, 2018,453: 111-126.
|