[17] |
PAKNIAT N , SHIRALY D , ESLAMI Z . Certificateless authenticated encryption with keyword search:enhanced security model and a concrete construction for industrial IoT[J]. Journal of Information Security and Applications, 2020,53:102525.
|
[18] |
MA M M , HE D B , KUMAR N ,et al. Certificateless searchable public key encryption scheme for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2018,14(2): 759-767.
|
[19] |
黄海平, 杜建澎, 戴华 ,等. 一种基于云存储的多服务器多关键字可搜索加密方案[J]. 电子与信息学报, 2017,39(2): 389-396.
|
|
HUANG H P , DU J P , DAI H ,et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage[J]. Journal of Electronics & Information Technology, 2017,39(2): 389-396.
|
[20] |
张强, 王国军, 张少波 . 基于多边缘服务器的个性化搜索隐私保护方法[J]. 通信学报, 2019,40(2): 40-50.
|
|
ZHANG Q , WANG G J , ZHANG S B . Method of privacy protection based on multiple edge servers in personalized search[J]. Journal on Communications, 2019,40(2): 40-50.
|
[21] |
SHAO J , CAO Z F , WANG L C ,et al. Proxy re-signature schemes without random oracles[R]. IACR Cryptology EPrint Archive, 2007.
|
[22] |
HUANG Q , LI H B . An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J]. Information Sciences, 2017,403/404: 1-14.
|
[1] |
WU H , TIAN H , NIE G F ,et al. Wireless powered mobile edge computing for industrial Internet of things systems[J]. IEEE Access, 2020,8: 101539-101549.
|
[2] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceedings of 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55.
|
[3] |
LIU Z L , WENG J , LI J ,et al. Cloud-based electronic health record system supporting fuzzy keyword search[J]. Soft Computing, 2016,20(8): 3243-3255.
|
[4] |
BONEH D , DI C G , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// 2004 International Conference on the Theory and Applications of о Cryptographic Techniques. Berlin:Springer, 2004: 506-522.
|
[5] |
PENG Y G , CUI J T , PENG C G ,et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014,11(11): 100-113.
|
[6] |
ZHENG Q J , LI X X , AZGIN A . CLKS:certificateless keyword search on encrypted data[M]. Cham: Springer International Publishing, 2015.
|
[7] |
MA M M , HE D B , KHAN M K ,et al. Certificateless searchable public key encryption scheme for mobile healthcare system[J]. Computers & Electrical Engineering, 2018,65: 413-424.
|
[8] |
WU T Y , MENG C , CHEN C M ,et al. On the security of a certificateless public key encryption with keyword search[C]// Advances in Intelligent Information Hiding and Multimedia Signal Processing. Berlin:Springer, 2017: 191-197.
|
[9] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// Applied Cryptography and Network Security. Berlin:Springer, 2004: 31-45.
|
[10] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[11] |
张玉磊, 文龙, 王浩浩 ,等. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020,42(5): 1094-1101.
|
|
ZHANG Y L , WEN L , WANG H H ,et al. Certificateless authentication searchable encryption scheme for multi-user[J]. Journal of Electronics & Information Technology, 2020,42(5): 1094-1101.
|
[12] |
SUN L X , XU C X , LI C ,et al. Server-aided searchable encryption in multi-user setting[J]. Computer Communications, 2020,164: 25-30.
|
[13] |
MA M M , FAN S Q , FENG D G . Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine[J]. Journal of Information Security and Applications, 2020,55:102652.
|
[14] |
PAN X Y , LI F G . Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability[J]. Journal of Systems Architecture, 2021,115:102075.
|
[15] |
WU L B , ZHANG Y B , MA M M ,et al. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things[J]. Annals of Telecommunications, 2019,74(7/8): 423-434.
|
[16] |
CHENAM V B , ALI S T . A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA[J]. Computer Standards & Interfaces, 2022,81:103603.
|