[1] |
项菲, 刘川意, 方滨兴 , 等. 云计算环境下密文搜索算法的研究[J]. 通信学报, 2013,34(7):143-153. XIANG F , LIU C Y , FANG B X , et al. Research on ciphertext search for the cloud environment[J]. Journal on Communications, 2013,34(7):143-153.
|
[2] |
沈志荣, 薛巍, 舒继武 . 可搜索加密机制研究与进展[J]. 软件学报, 2014,25(4):880-895. SHEN Z R , XUE W , SHU J W . Survey on the research and develop-ment of searchable encryption schemes[J]. Journal of Software, 2014,25(4):880-895.
|
[3] |
SONG D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// The IEEE Symposium on Security and Pri-vacy(S&P'00). c2000:44-55.
|
[4] |
BONEH D , CRESCENZOM G D , OSTROVSKY R , et al. Public key encryption with keywordsearch[C]// The International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT2004). Interlaken,Switzerland, c2004:506-522.
|
[5] |
LEE C C , HSU S T , H M S . A study of conjunctive keyword search-able schemes[J]. International Journal of Network Security, 2013,15(5): 321-330.
|
[6] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// Applied Cryptography and Network Se-curity Conference (ACNS 2004). Yellow Mountain,China, c2004:31-45.
|
[7] |
PARK D J , KIM K , LEE P J . Public key encryption with conjunc-tive-field keyword search[C]// The 5th Information Security Applica-tions International Workshop (WISA 2004). Jeju Island,Korea, c2004:73-86.
|
[8] |
HWANG Y H , LEE P J . Public key encryption with conjunctive key-word search and its extension to a multi-user system[C]// The first In-ternational Conference of Pairing-BasedCryptography (Pairing 2007). Tokyo,Japan, c2007:2-22.
|
[9] |
BONEH D , WATERS B . Conjunctive,subset,and range queries on encrypted data[C]// The 4th Theory of Cryptography conference (TCC 2007). Amsterdam,The Netherlands, c2007:535-554.
|
[10] |
KATZ J , SAHAI A , WATERS B . Predicate encryption supporting disjunctions,polynomial equations,and inner products[C]// The 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2008). Istanbul,Turkey, c2008:146-162.
|
[11] |
CHEN Y C , HORNG G . Timestamped conjunctive keyword searchable public key encryption[C]// Fourth International Conference on Innova-tion Computing Information and Control (ICICIC). Kaohsiung, c2009:729-932.
|
[12] |
ZHANG B , ZHANG F G . An efficient public key encryption with conjunctive-subset keywords search[J]. Journal of Network and Com-puter Applications, 2011,34(1): 262-267.
|
[13] |
YANG Y , MA G D . Proxy re-encryption conjunctive keyword search against keyword guessing attack[C]// The IEEE International Confer-ence on Computers,Communications and IT Applications. Hongkong,China, c2013:125-130.
|
[14] |
CHEN Z H , WU C Y , WANG D S , et al. Conjunctive keywords searchable encryption with efficient pairing,constant ciphertext and short trapdoor[C]// Intelligence and Security InformaticsPacific Asia Workshop (PAISI 2012). Kuala Lumpur,Malaysia, c2012:176-189.
|
[15] |
王尚平, 刘利军, 刘亚玲 . 一个高效的基于连接关键词的可搜索加密方案[J]. 电子与信息学报, 2013,35(9):2266-2271. WANG S P , LIU L J , LIU Y L . An efficient conjunctive keyword searchable encryption scheme[J]. Journal of Electronics and Informa-tion Technology, 2013,35(9):2266-2271.
|
[16] |
KERSCHBAUM F . Secure conjunctive keyword searches for unstruc-tured text[C]// The 5th International Conference on Network and Sys-tem Security (NSS). c2011:285-289.
|
[17] |
李双, 徐茂智 . 基于属性的可搜索加密方案[J]. 计算机学报, 2014,37(5):1017-1024. LI S , XU M Z . Attribute-based public encryption with keyword search[J]. Chinese Journal of Computers, 2014,37(5):1017-1024.
|
[18] |
ZHENG Q , XU S H , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]// Proceeding-IEEE INFOCOM. c2014:522-530.
|
[19] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. Alexandria,VA,USA, c2006:89-98.
|