[1] |
MELL P , GRANCE T . The NIST definition of cloud computing[J]. National Institute of Standards and Technology, 2009,53(6): 50-53.
|
[2] |
ARMBRUST M , FOX A , GRIFFITH R ,et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
|
[3] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473.
|
[4] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55.
|
[5] |
GOH E J . Secure indexes[J]. IACR Cryptology ePrint Archive, 2003,6(12): 12-22.
|
[6] |
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// Applied Cryptography and Network Security. Berlin:Springer, 2005: 442-455.
|
[7] |
CURTMOLA R , GARAY J A , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// ACM Conference Computer and Communication Security.New York:ACM Press. 2006: 376-379.
|
[8] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2004: 31-45.
|
[9] |
ZHENG Q , LI X , AZGIN A . CLKS:certificateless keyword search on encrypted data[C]// International Conference on Network and System Security. Berlin:Springer, 2015: 239-253.
|
[10] |
ZHANG W , LIN Y , XIAO S ,et al. Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing[J]. IEEE Transactions on Computers, 2015,65(5): 1566-1577.
|
[11] |
YANG Y , MA M . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds[J]. IEEE Transactions on Information Forensics and Security, 2015,11(4): 746-759.
|
[12] |
SHEN J , SHEN J , CHEN X ,et al. An efficient public auditing protocol with novel dynamic structure for cloud data[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10): 2402-2415.
|
[13] |
SUN W , WANG B , CAO N ,et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,25(11): 3025-3035.
|
[14] |
WANG J , CHEN X , HUANG X ,et al. Verifiable auditing for outsourced database in cloud computing[J]. IEEE Transactions on Computers, 2015,64(11): 3293-3303.
|
[15] |
CHUM C S , ZHANG X . A new bloom filter structure for searchable encryption schemes[C]// Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. New York:ACM Press, 2017: 143-145.
|
[16] |
MIAO Y , WENG J , LIU X ,et al. Enabling verifiable multiple keywords search over encrypted cloud data[J]. Information Sciences, 2018,465(10): 21-37.
|
[17] |
BONEH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 506-522.
|
[18] |
GUO Y , LI J , ZHANG Y ,et al. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage[J]. Security & Communication Networks, 2016,9(18): 4852-4862.
|
[19] |
MIAO Y , MA J , LIU X ,et al. Practical attribute-based multi-keyword search scheme in mobile crowdsourcing[J]. IEEE Internet of Things Journal, 2017,5(4): 3008-3018.
|
[20] |
KUROSAWA K , OHTAKI Y . How to update documents verifiably in searchable symmetric encryption[C]// International Conference on Cryptology and Network Security. Berlin:Springer, 2013: 309-328.
|
[21] |
KUROSAWA K , . Garbled searchable symmetric encryption[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2014: 234-251.
|
[22] |
GARG N , BAWA S . RITS-MHT:relative indexed and time stamped Merkle Hash tree based data auditing protocol for cloud computing[J]. Journal of Network and Computer Applications, 2017,84: 1-13.
|
[23] |
杨波 . 密码学中的可证明安全性[M]. 北京: 清华大学出版社, 2017.
|
|
YANG B . Provable security in cryptography[M]. Beijing: Tsinghua University PressPress, 2017.
|
[24] |
ZHENG Q , LI X , AZGIN A . CLKS:certificateless keyword search on encrypted data[C]// International Conference on Network and System Security. Berlin:Springer, 2015: 239-253.
|
[25] |
MIAO Y , MA J , LIU X ,et al. VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner[J]. Peer-to-peer Networking and Applications, 2018,11(2): 287-297.
|