1 |
GOLDREICH O , OSTROVSKY R . Software protection and simulation on oblivious RAMs[J]. Journal of the ACM, 1996,43(3):431-473.
|
2 |
SONG D , WAGNER D , PERRIG A . Practical techniques for searching on encrypted data[A]. SSP 2000,Proceedings of the 2000 IEEE Symposium on Security and Privacy[C]. Seattle,USA, 2006.44-55.
|
3 |
GOH E J . Secure indexes[EB/OL]. .
|
4 |
CHANG Y , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[A]. ACNS’05,Proceedings of Applied Cryptography and Network Security,LNCS 3531[C]. Berlin,Germany, 2005.445-455.
|
5 |
CURTMOLA R , GARAY J , KAMARA S . OSTROVSKY R.Searchable symmetric encryption:improved definitions and efficient constructions[A]. CCS 2006,Proceedings of ACM Conference on Computer and Communications Security[C]. New York,USA, 2006.79-88.
|
6 |
LIESDONK P , SEDGHI S , DOUMEN J , HARTEL P H , JONKER W . Computationally efficient searchable symmetric encryption[A]. SDM 2010,Proceedings of Workshop on Secure Data Management,LNCS 6358[C]. Berlin,Germany, 2010.87-100.
|
7 |
KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric encryption[A]. FC 2012,Proceedings of Financial Cryptography and Data Security,LNCS 7397[C]. Berlin,Germany, 2012.285-298.
|
8 |
BONEH D , CRESCENZO G D , OSTROVSKY R , PERSIANO G . Public key encryption with keyword search[A]. Advances in Cryptology:EUROCRYPT 2004,LNCS 3027[C]. Berlin,Germany, 2004.506-522.
|
9 |
ABDALLA M , BELLARE M , CATALANO D , et al. Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J]. Journal of Cryptology, 2008,21(3):350-391.
|
10 |
BELLARE M , BOLDYREVA A , O’NEIL A . Deterministic and efficiently searchable encryption[A]. Advances in Cryptology:CRYPTO 2007,LNCS 4622[C]. Berlin,Germany, 2007.535-552.
|
11 |
CAMENISCH J , KOHLWEISS M , RIAL A , et al. Blind and anonymous identity-based encryption and authorized private searches on public-key encrypted data[A]. PKC’09,Proceedings of Public Key Cryptography,LNCS 5443[C]. Berlin,Germany, 2009.196-214.
|
12 |
BONEH D , SAHAI A , WATERS B . Functional encryption:Definitions and challenges[A]. TCC 2011,Proceedings of Theory of Cryptography,LNCS 6597[C]. Berlin,Germany, 2011.253-273.
|
13 |
SHI E , BETHENCOURT J , CHAN T , et al. Multi-dimensional range query over encrypted data[A]. SP 2007,Proceedings of the IEEE Symposium on Security and Privacy[C]. Seattle,USA, 2007.350-364.
|
14 |
AGRAWAL R , KIERNAN J , SRIKANT R , et al. Order preserving encryption for numeric data[A]. SIGMOD 2004,Proceedings of ACM SIGMOD Conference[C]. New York,USA, 2004.563-574.
|
15 |
BOLDYREVA A , CHENETTE N , LEE Y , et al. Order preserving symmetric encryption[A]. Advances in Cryptology:EUROCRYPT 2009,LNCS 5479[C]. Berlin,Germany, 2009.224-241.
|
16 |
HACIGUMUS H , IYER B , LI C , et al. Executing SQL over encrypted data in the database-service-provider model[A]. SIGMOD 2002,Proceedings of ACM SIGMOD Conference on Management of Data[C]. New York,USA, 2002.216-227.
|
17 |
HORE B , MEHROTRA S , TSUDIK G . A privacy-preserving index for range queries[A]. CLDB 2004,Proceedings of Very Large Databases Conference[C]. Seattle,USA, 2004.720-731.
|
18 |
蔡克, 张敏, 冯登国 . 基于单断言的安全的密文区间检索[J]. 计算机学报, 2011,34(11):2093-2103. CAI K , ZHANG M , FENG D G . Secure range query with single assertion on encrypted data[J]. Chinese Journal of Computers, 2011,34(11):2093-2103.
|