[1] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// 2000 IEEE Symposium on Security and Privacy. Berkeley, 2000: 44-55.
|
[2] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy,Washington, 2007: 321-334.
|
[3] |
YIN H , ZHANG J , XIONG Y ,et al. CP-ABSE:a ciphertext-policy attribute-based searchable encryption scheme[J]. IEEE Access, 2019,7(99): 5682-5694.
|
[4] |
刘振华, 周佩琳, 段淑红 . 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018,40(3): 683-689.
|
|
LIU Z H , ZHOU P L , DUAN S H . Attribute proxy re-encryption scheme supporting keyword search[J]. Journal of Electronics & Information Technology, 2018,40(3): 683-689.
|
[5] |
孙瑾, 王小静, 王尚平 ,等. 支持属性撤销的可验证多关键词搜索加密方案[J]. 电子与信息学报, 2019,41(1): 53-60.
|
|
SUN J , WANG X J , WANG S P ,et al. Verifiable multi-keyword search encryption scheme supporting attribute revocation[J]. Journal of Electronics & Information Technology, 2019,41(1): 53-60.
|
[6] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// The 13th ACM Conference on Computer and Communications Security. Alexandria, 2006: 79-88.
|
[7] |
CHAI Q , GONG G . Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]// The 2012 IEEE International Conference on Communications. Ottawa, 2012: 917-922.
|
[8] |
JIANG X , YU J , YAN J ,et al. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data[J]. Information Sciences, 2017,40(3): 22-41.
|
[9] |
杜瑞忠, 李明月, 田俊峰 ,等. 基于倒排索引的可验证混淆关键字密文检索方案[J]. 软件学报, 2019,30(8): 2362-2374.
|
|
DU R Z , LI M Y , TIAN J F ,et al. A ciphertext retrieval scheme for verifiable confusing keywords based on inverted index[J]. Journal of Software, 2019,30(8): 2362-2374.
|
[10] |
伍祈应, 马建峰, 李辉 ,等. 支持用户撤销的多关键字密文查询方案[J]. 通信学报, 2017,38(8): 183-193.
|
|
WU Q Y , MA J F , LI H ,et al. Multi-keyword ciphertext query scheme supporting user revocation[J]. Journal on Communications, 2017,38(8): 183-193.
|
[11] |
CAI C , WENG J , YUAN X ,et al. Enabling reliable keyword search in encrypted decentralized storage with fairness[J]. IEEE Transactions on Dependable and Secure Computing, 2018,1(99):1.
|
[12] |
ZHANG Y H , DENG R H , SHU J ,et al. TKSE:trustworthy keyword search over encrypted data with two-side verifiability via blockchain[J]. IEEE Access, 2018(6): 31077-31087.
|
[13] |
WANG S P , ZHANG Y L , ZHANG Y L . A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems[J]. IEEE Access, 2018(6): 38437-38450.
|
[14] |
CHEN L X , LEE W K , CHANG C C ,et al. Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019,95: 420-429.
|
[15] |
LI H G , TIAN H B , ZHANG F G ,et al. Blockchain-based searchable symmetric encryption scheme[J]. Computers & Electrical Engineering, 2019,73: 32-45.
|