[1] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security and Privacy IEEE Computer Society. 2000: 44-55.
|
[2] |
GOH E J . Secure Indexes[J]. IACR Cryptology ePrint Archive, 2003,2003:216.
|
[3] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// ACM Conference on Computer and Communications Security. ACM, 2006: 895-934.
|
[4] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// ACM Conference on Computer & Communications Security. 2015: 965-976.
|
[5] |
CHASE M , KAMARA S . Structured encryption and controlled disclosure[M]. Advances in Cryptology-ASIACRYPT 2010. Springer Berlin Heidelberg, 2010: 577-594.
|
[6] |
LIESDONK P V , SEDGHI S , DOUMEN J ,et al. Computationally efficient searchable symmetric encryption[C]// Secure Data Management,VLDB Workshop,SDM 2010. Singapore, 2010: 87-100.
|
[7] |
CASH D , JAEGER J , JARECKI S ,et al. Dynamic searchable encryption in very-large databases:data structures and implementation[C]// Network and Distributed System Security Symposium. 2014.
|
[8] |
KAMARA S , PAPAMANTHOU C . Parallel and dynamic searchable symmetric encryption[M]. Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013: 258-274.
|
[9] |
KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric encryption[J]. Lecture Notes in Computer Science, 2012,7397: 258-274.
|
[10] |
ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472.
|
[11] |
DIFFIE W , HELLMAN M E . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654.
|
[12] |
CASH D , JARECKI S , JUTLA C ,et al. Highly-scalable searchable symmetric encryption with support for boolean queries[M]. Advances in Cryptolog-CRYPTO 2013. Springer Berlin Heidelberg, 2013: 353-373.
|
[13] |
FANG L , SUSILO W , GE C ,et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Sciences An International Journal, 2013,238(7): 221-241.
|
[14] |
POPA R A , REDFIELD C M S , ZELDOVICH N ,et al. CryptDB:protecting confidentiality with encrypted query processing[C]// SOSP. 2011: 85-100.
|
[15] |
NAVEED M , KAMARA S , WRIGHT C V . Inference attacks on property-preserving encrypted databases[C]// ACM Sigsac Conference on Computer and Communications Security. 2015: 644-655.
|
[16] |
DIJK M V , GENTRY C , HALEVI S ,et al. Fully homomorphic encryption over the integers[C]// International Conference on Theory and Applications of Cryptographic Techniques. Springer-Verlag, 2010: 24-43.
|
[17] |
STEFANOV E , VAN DIJK M , SHI E ,et al. Path ORAM:an extremely simple oblivious RAM protocol[C]// ACM Sigsac Conference on Computer & Communications Security. 2013: 299-310.
|
[18] |
CATTELL .Scalable SQL and NoSQL data stores[J]. ACM Sigmod Record, 2010,39(4): 12-27.
|
[19] |
STEFANOV E , PAPAMANTHOU C , SHI E . Practical dynamic searchable encryption with small leakage[C]// Network and Distributed System Security Symposium. 2014.
|
[20] |
LAKSHMAN A , MALIK P . Cassandra:a decentralized structured storage system[J]. ACM Sigops Operating Systems Review, 2010,44(2): 35-40.
|
[21] |
BELLARE M , BOLDYREVA A O'NEILL A . Deterministic and efficiently searchable encryption[C]// International Cryptology Conference on Advances in Cryptology. Springer-Verlag, 2006: 535-552.
|
[22] |
LI R , LIU A X , WANG A L ,et al. Fast range query processing with strong privacy protection for cloud computing[J]. IEEE/ACM Transactions on Networking, 2016,24(4): 2305-2318.
|
[23] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[J]. In INFOCOM, 2012,3(9): 1-5.
|
[24] |
CHASE M , SHEN E . Substring-searchable symmetric encryption[J]. Proceedings on Privacy Enhancing Technologies, 2015(2): 263-281.
|
[25] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2011,25(1): 829-837.
|
[26] |
XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2015,27(2):1.
|
[27] |
NAVEED M , PRABHAKARAN M , GUNTER C A . Dynamic searchable encryption via blind storage[C]// S&P. 2014: 639-654.
|
[28] |
LIU C , ZHU L , WANG M ,et al. Search pattern leakage in searchable encryption:attacks and new construction[J]. Information Sciences, 2014,265(5): 176-188.
|