[1] |
CHAUDHARI S , KUMAR PATHURI S . A comprehensive survey on public auditing for secure cloud storage[J]. International Journal of Engineering & Technology, 2018,7: 565-569.
|
[2] |
SUN P J . Privacy protection and data security in cloud computing:a survey,challenges,and solutions[J]. IEEE Access, 2019,7: 147420-147452.
|
[3] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceedings of Proceeding 2000 IEEE Symposium on Security and Privacy. 2002: 44-55.
|
[4] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// Proceedings of the 2012 ACM Conference on Computer and Communications Security. 2012: 965-976.
|
[5] |
STEFANOV E , PAPAMANTHOU C , SHI E ,et al. Practical dynamic searchable encryption with small leakage[EB]. Cryptology ePrint Archive, 2013.
|
[6] |
BOST R , MINAUD B , OHRIMENKO O . Forward and backward private searchable encryption from constrained cryptographic primitives[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 1465-1482.
|
[7] |
CHAMANI J G , PAPADOPOULOS D , PAPAMANTHOU C ,et al. New constructions for forward and backward private symmetric searchable encryption[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018: 1038-1055.
|
[8] |
DEMERTZIS I , CHAMANI J G , PAPADOPOULOS D ,et al. Dynamic searchable encryption with small client storage[EB]. Cryptology ePrint Archive, 2019.
|
[9] |
ZHONG H , LI Z F , CUI J ,et al. Efficient dynamic multi-keyword fuzzy search over encrypted cloud data[J]. Journal of Network and Computer Applications, 2020,149:102469.
|
[10] |
ZHANG Y , YOU L , LI Y . Tree-based public key encryption with conjunctive keyword search[J]. Security and Communication Networks, 2021,2021: 1-16.
|
[11] |
FAN B , ANDERSEN D G , KAMINSKY M ,et al. Cuckoo filter:practically better than bloom[C]// Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies. 2014: 75-88.
|
[12] |
HE D B , MA M M , ZEADALLY S ,et al. Certificateless public key authenticated encryption with keyword search for industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2018,14(8): 3618-3627.
|
[13] |
ZHANG R , XUE R . Efficient keyword search for public-key setting[C]// Proceedings of MILCOM 2015-2015 IEEE Military Communications Conference. 2015: 1236-1241.
|
[14] |
YE F H , DONG X L , SHEN J C ,et al. A verifiable dynamic multi-user searchable encryption scheme without trusted third parties[C]// Proceedings of 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS). 2020: 896-900.
|
[15] |
GUO C , ZHUANG R H , CHANG C C ,et al. Dynamic multi-keyword ranked search based on bloom filter over encrypted cloud data[J]. IEEE Access, 2019,7: 35826-35837.
|
[16] |
SONG C G , LIU X , YAN Y L . Efficient Public key encryption with field-free conjunctive keywords search[C]// Proceedings of International Conference on Trusted Systems. 2015: 394-406.
|