[1] |
WANG H J , NING J T , HUANG X Y ,et al. Secure fine-grained encrypted keyword search for E-healthcare cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(3): 1307-1319.
|
[2] |
WANG H J , DONG X L , CAO Z F . Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search[J]. IEEE Transactions on Services Computing, 2020,13(6): 1142-1151.
|
[3] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceeding of 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55.
|
[4] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// Proceedings of 2012 ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 965-976.
|
[5] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[6] |
JIANG P , MU Y , GUO F C ,et al. Secure-channel free keyword search with authorization in manager-centric databases[J]. Computers & Security, 2017,69: 50-64.
|
[7] |
WANG H J , DONG X L , CAO Z F ,et al. Secure key-aggregation authorized searchable encryption[J]. Science China Information Sciences, 2019,62(3): 1-3.
|
[8] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473.
|
[9] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98.
|
[10] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334.
|
[11] |
ZHENG Q J , XU S H , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]// Proceedings of IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 522-530.
|
[12] |
SUN W H , YU S C , LOU W J ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198.
|
[13] |
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2008: 111-129.
|
[14] |
LAI J Z , DENG R H , LI Y J . Expressive CP-ABE with partially hidden access structures[C]// Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2012: 18-19.
|
[15] |
CUI H , DENG R H , WU G W ,et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures[C]// International Conference on Provable Security. Berlin:Springer, 2016: 19-38.
|
[16] |
QIU S , LIU J Q , SHI Y F ,et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J]. Science China Information Sciences, 2016,60(5): 1-12.
|
[17] |
WANG S P , GAO T T , ZHANG Y L . Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage[J]. PLoS One, 2018,13(11): 1.
|
[18] |
MIAO Y , LIU X , CHOO K K R ,et al. Privacy-preserving attribute-based keyword search in shared multi-owner setting[J]. IEEE Transactions on Dependable and Secure Computing, 2019,18(3): 1080-1094.
|
[19] |
ZHANG Z S , ZHANG W , QIN Z G . A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing[J]. Future Generation Computer Systems, 2021,123: 181-195.
|
[20] |
MIAO Y B , MA J F , LIU X M ,et al. VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner[J]. Peer-to-Peer Networking and Applications, 2018,11(2): 287-297.
|
[21] |
SHINDE S , CHUA Z L , NARAYANAN V ,et al. Preventing page faults from telling your secrets[C]// Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York:ACM Press, 2016: 317-328.
|
[22] |
NING J T , HUANG X Y , SUSILO W ,et al. Dual access control for cloud-based data storage and sharing[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 1036-1048.
|
[23] |
FISCH B , VINAYAGAMURTHY D , BONEH D ,et al. IRON:functional encryption using intel SGX[C]// Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 765-782.
|