[1] |
BONEH D , DI CRESCENZO G , OSTROVSKY R , et al. Public key encryption with keyword search[A]. Advances in Cryptology-Eurocrypt 2004[C]. Springer Berlin Heidelberg, 2004. 506-522.
|
[2] |
ABDALLA M , BELLARE M , CATALANO D , et al. Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[A]. Advances in Cryptology–CRYPTO 2005[C]. Springer Berlin Heidelberg, 2005. 205-222.
|
[3] |
BYUN J W , RHEE H S , PARK H A , et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[A]. Secure Data Management[C]. Springer Berlin Heidelberg, 2006. 75-83.
|
[4] |
RHEE H S , PARK J H , SUSILO W , et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010,83(5): 763-771.
|
[5] |
HU C , LIU P . A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension[A]. Advances in Computer Science,Environment,Ecoinformatics,and Education[C]. Springer Berlin Heidelberg, 2011. 131-136.
|
[6] |
TANG Q , CHEN L . Public-key encryption with registered keyword search[A]. Public Key Infrastructures,Services and Applications[C]. Springer Berlin Heidelberg, 2010. 163-178.
|
[7] |
XU P , JIN H , WU Q , et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277.
|
[8] |
李经纬, 贾春福, 刘皙理 , 等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128. LI J W , JIA C F , LIU Z L , et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128.
|
[9] |
JEONG I R , KWON J O , HONG D , et al. Constructing PEKS schemes secure against keyword guessing attacks is possible[J]. Computer Communications, 2009,32(2): 394-396.
|
[10] |
CHEN Y C . SPEKs:secure server-designation public key encryption with keyword search against keyword guessing attacks[J]. The Computer Journal, 2015,58(4): 922-933.
|
[11] |
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[A]. Pairing-Based Cryptography-Pairing 2007[C]. Springer Berlin Heidelberg, 2007. 2-22.
|
[12] |
苏金树, 曹丹, 王小峰 , 等. 属性基加密机制[J]. 软件学报, 2011,22(6): 1299-1315. SU J S , CAO D , WANG X F , et al. Attribute-based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[13] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. Security and Privacy,SP'07[C]. 2007. 321-334.
|
[14] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. ACM, 2006. 89-98.
|
[15] |
HAN F , QIN J , ZHAO H , et al. A general transformation from KP-ABE to searchable encryption[J]. Future Generation Computer Systems, 2014,(30): 107-115.
|
[16] |
LV Z , HONG C , ZHANG M , et al. Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)[R]. Cryptology ePrint Archive,Report 2014/614, 2014.
|
[17] |
LAI J , ZHOU X , DENG R H , et al. Expressive search on encrypted data[A]. Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security[C]. ACM, 2013. 243-252.
|
[18] |
李双, 徐茂智 . 基于属性的可搜索加密方案[J]. 计算机学报, 2014,37(5): 1017-1024. LI S , XU M Z . Attribute based public encryption with keyword search[J]. Chinese Journal of Computers, 2014,37(5): 1017-1024.
|
[19] |
WANG C , LI W , LI Y , et al. A ciphertext-policy attribute-based encryption scheme supporting keyword search function[A]. Cyberspace Safety and Security[C]. 2013. 377-386.
|
[20] |
LI J , ZHANG L . Attribute-based keyword search and data access control in cloud[A]. Computational Intelligence and Security (CIS),2014 Tenth International Conference[C]. IEEE, 2014. 382-386.
|
[21] |
LIU P , WANG J , MA H , et al. Efficient verifiable public key encryption with keyword search based on KP-ABE[A]. Broadband and Wireless Computing,Communication and Applications (BWCCA),2014 Ninth International Conference on[C]. IEEE, 2014. 584-589.
|
[22] |
ZHENG Q , XU S , ATENIESE G . Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data[R]. Cryptology ePrint Archive,Report 2013/462, 2013.
|
[23] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[A]. Advances in Cryptology,CRYPTO 2001[C]. Springer Berlin Heidelberg, 2001. 213-229.
|
[24] |
GOH E J , JARECKI S . A signature scheme as secure as the Diffie-Hellman problem[A]. Advances in CryptologyEUROCRYPT 2003[C]. Springer Berlin Heidelberg, 2003. 401-415.
|
[25] |
DE C A , IOVINO V . JPBC:Java pairing based cryptography[A]. IEEE Symposium on Computers & Communications[C]. IEEE Computer Society, 2011. 850-855.
|