[1] |
OSTROVSKY R . Software Protection and Simulation on Oblivious RAMS[D]. MIT Ph D Thesis, 1992.
|
[2] |
SONG D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. 2000.1081-6011.
|
[3] |
LU H , GU D , JIN C , et al. Reducing extra storage in searchable sym-metric encryption scheme[A]. Proceedings of the 4th International Conference on Cloud Computing Technology and Science[C]. 2012.255-262.
|
[4] |
KAMARA S , PAPAMANTHOU C . Parallel and dynamic searchable symmetric encryption[EB/OL]. . 2013.
|
[5] |
BONEH D , CRESCENZO G , OSTROVSKY R , et al. Public key encryption with keyword search[A]. Proceedings of Eurocrypt[C]. 2004.506-522.
|
[6] |
ZHANG R , IMAI H . Combining public key encryption with keyword search and public key encryption[J]. IEICE Transactions on Informa-tion and Systems, 2009,92 (5):888-896.
|
[7] |
LONG B , GU D , DING N , et al. On improving the performance of public key encryption with keyword search[A]. Proceedings of Inter-national Conference on Cloud and Service Computing[C]. 2012.143-147.
|
[8] |
BAEK J , SAFAVI-NAINI R , SUSILO W . Public key encryption with keyword search revisited[A]. Proceedings of International Conference on Computational Science and Its Applications[C]. 2008.1249-1259.
|
[9] |
BYUN J , RHEE H , PARK H , et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[A]. Proceed-ings of SIAM Conference on Data Mining[C]. 2006.75-83.
|
[10] |
YAU W , HENG S , GOI B . Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[A]. Pro-ceedings of Autonomic and Trusted Computing[C]. 2008.100-105.
|
[11] |
GU C , ZHU Y , PAN H . Efficient public key encryption with keyword search schemes from pairings[A]. Proceedings of Information Security and Cryptography[C]. 2008.372-383.
|
[12] |
RHEE H , PARK J , LEE D . Generic construction of designated tester public-key encryption with keyword search[J]. Information Sciences, 2012,205:93-109.
|
[13] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive search over encrypted data[A]. Proceedings of Applied Cryptography and Network Security[C]. 2004.31-45.
|
[14] |
PARK D , KIM K , LEE P . Public key encryption with conjunctive field keyword search[A]. Proceedings of Information Security Applications[C]. 2004.73-86.
|
[15] |
YANG C , ZHANG W , XU J , et al. A fast privacy-preserving multi-keyword search scheme on cloud data[A]. Proceedings of Inter-national Conference on Cloud and Service Computing[C]. 2012.104-110.
|
[16] |
DING M , GAO F , JIN Z , et al. An efficient public key encryption with conjunctive keyword search scheme based on pairings[A]. Proceed-ings of IEEE International Conference on Network Infrastructure and Digital Content[C]. 2012.526-530.
|
[17] |
CHEN Z , WU C , WANG D , et al. Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trap-door[A]. Proceedings of Intelligence and Security Informatics[C]. 2012.176-189.
|
[18] |
CURTMOLA R , GARAY J , KAMARA S , et al. Searchable symmetric encryption: improved definitions and efficient constructions[A]. Pro-ceedings of ACM Conference on Computer and Communications Se-curity[C]. 2006.79-88.
|
[19] |
HWANG Y , LEE P . Public key encryption with conjunctive keyword search and its extension to a multi-user system[A]. Proceedings of Pairing-based Cryptography[C]. 2007.2-22.
|
[20] |
BAO F , DENG R , DING X , et al. Private query on encrypted data in multi-user settings[A]. Proceedings of International Conference on Information Security Practice and Experience[C]. 2008.71-85.
|
[21] |
YANG Y , LU H , WENG J . Multi-user private keyword search for cloud computing[A]. Proceedings of IEEE International Conference on Cloud Computing Technology and Science[C]. 2011.264-271.
|
[22] |
DONG C , RUSSELLO G , DULAY N . Shared and searchable en-crypted data for untrusted servers[J]. Journal of Computer Security, 2010,19 (3):367-397.
|
[23] |
LIU Q , TAN C , WU J , et al. Cooperative private searching in clouds[J]. Journal of Parallel and Distributed Computing, 2012,72 (8):1019-1031.
|
[24] |
洪澄, 张敏, 冯登国 . 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011,32(7):125-132. HONG C , ZHANG M , FENG D G . Achieving efficient dynamic cryp-tographic access control in cloud storage[J]. Jounal on Communica-tions, 2011,32(7):125-132.
|
[25] |
王映康, 罗文俊 . 云存储环境下多用户可搜索加密方案[J]. 电信科学, 2012,28(11):103-107. WANG Y K , LUO W J . A scheme of multi-user searchable encryption in cloud storage[J]. Telecommunications Science, 2012,28(11):103-107.
|
[26] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[A]. Proceedings of IEEE Symposium on Secu-rity and Privacy[C]. 2007.321-334.
|
[27] |
WATERS B . Ciphertext-policy attribute-based encryption: an expres-sive, efficient, and provably secure realization[A]. Proceedings of Public Key Cryptography[C]. 2011.53-70.
|
[28] |
HOHENBERGER S , WATERS B . Atribute-based encryption with fast decryption[A]. Proceedings of Public Key Cryptography[C]. 2013.162-179.
|
[29] |
LEWKO A , WATERS B . New proof methods for attribute-based encryption: achieving full security through selective techniques[A]. Proceedings of Crypto[C]. 2012.180-198.
|
[30] |
IBRAIMI L , TANG Q , HARTEL P , et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[A]. Proceedings of Information Security Practice and Experience[C]. 2009.1-12.
|
[31] |
LYNN B . The PBC library[EB/OL]. .
|