[1] |
BONEH D , CRESCENZO G D , OSTROVSKY R , PERSIANO G . Public key encryption with keyword search[A]. EUROCYPT[C]. 2004. 506-522.
|
[2] |
BAEK J,SAFAVI-NAINI R , SUSILO W . Public key encryption with keyword search revisited[A]. ACIS[C]. 2006. 1249-1259.
|
[3] |
BYUN J W,RHEE H S , PARK H A , LEE D H . Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[A]. SDM[C]. 2006. 75-83.
|
[4] |
RHEE H S , SUSILO W , KIM H J . Secure searchable public key encryption scheme against keyword guessing attacks[J]. IEICE Electronics Express, 2009,6(5): 237-243.
|
[5] |
RHEE H S , PARK J H , SUSILO W , LEE D H . Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of System and Software, 2010,83(5): 763-771.
|
[6] |
FANG L , SUSILO W , GE C , WANG J . Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Sciences, 2013,238: 221-241.
|
[7] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[A]. INFOCOM[C]. 2010. 1-5.
|
[8] |
WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[A]. ICDCS[C]. 2010. 253-262.
|
[9] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233.
|
[10] |
WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems , 2012,23(8): 1467-1479.
|
[11] |
LI M , YU S , CAO N ,et al. Authorized private keyword search over encrypted data in cloud computing[A]. ICDCS[C]. 2011. 383-392.
|
[12] |
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private identity-based encryption:Hiding the function in functional encryption[A]. CRYPTO[C]. Springer Berlin Heidelberg, 2013. 461-478.
|
[13] |
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private subspace-membership encryption and its applications[A]. ASIACRYPT[C]. Springer Berlin Heidelberg, 2013. 255-275.
|
[14] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[A]. INFOCOM[C]. 2010. 1-5.
|
[15] |
WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[A]. ICDCS[C]. 2010. 253-262.
|
[16] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233.
|
[17] |
WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems , 2012,23(8): 1467-1479.
|
[18] |
LI M , YU S , CAO N ,et al. Authorized private keyword search over encrypted data in cloud computing[A]. ICDCS[C]. 2011. 383-392.
|
[19] |
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private identity-based encryption:hiding the function in functional encryption[A]. CRYPTO[C]. Springer Berlin Heidelberg, 2013. 461-478.
|
[20] |
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private subspace-membership encryption and its applications[A]. ASIACRYPT[C]. Springer Berlin Heidelberg, 2013. 255-275.
|
[21] |
HAIDAR A N , ABDALLAH A E . Formal modeling of PKI based authentication[J]. Electronic Notes in Theoretical Computer Science, 2009,235: 55-70.
|
[22] |
GOLLMANN D , MEIER J , SABELFELD A . Computer Security[M]. Springer,Germany, 2006.
|
[23] |
AN J , DODIS Y , RABIN T . On the security of joint signature and encryption[A]. Eurocrypt[C]. 2002. 83-107.
|
[24] |
BONEH D , SHEN E , WATERS B . Strongly unforgeable signatures based on computational Diffie-Hellman[A]. PKC[C]. 2006. 229-240.
|
[25] |
SHAO Z , GAO Y . Practical verifiably encrypted signatures without random oracles[EB/OL]. .
|
[26] |
CHAUM D , ANTWERPEN H V . Undeniable signatures[A]. CRYPTO[C]. 1989. 212-216.
|
[27] |
KUROSAWA K , NOJIMA R . Relation between verifiable random functions and convertible undeniable signatures,and new constructions[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2014,97(1): 215-224.
|
[28] |
SCHULDT J C N , MATSUURA K . An efficient convertible undeniable signature scheme with delegatable verification[A]. ISPEC[C]. 2010. 276-293.
|
[29] |
HUANG Q , WONG D S , SUSILO W . The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles[J]. Information Sciences, 2013,228: 222-238.
|
[30] |
KATA J , LINDELL Y . Introduction to Modern Cryptography:Principles and Protocols[M]. CRC Press,Boca Raton, 2007.
|
[31] |
JEONG I R , KWON J O , HONG D , LEE D H . Constructing PEKS schemes secure against keyword guessing attacks is possible[J]. Computer Communications, 2009,32(2): 394-396.
|