[1] |
WEI L , ZHU H , CAO Z ,et al. Security and privacy for storage and computation in cloud computing[J]. Information Sciences, 2014,258: 371-386.
|
[2] |
MIAO Y , MA J , LIU Z . Revocable and anonymous searchable encryption in multi-user setting[J]. Concurrency and Computation:Practice and Experience, 2016,28(4): 1204-1218.
|
[3] |
REN K , WANG C , WANG Q . Security challenges for the public cloud[J]. IEEE Internet Computing, 2012,16(1): 69-73.
|
[4] |
LI J , MA R , GUAN H . Tees:an efficient search scheme over encrypted data on mobile cloud[J]. IEEE Transactions on Cloud Computing, 2017,5(1): 126-139.
|
[5] |
BONEH D , DI CRESCENZO G , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522.
|
[6] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// Second International Conference on Applied Cryptography and Network Security. 2004: 31-45.
|
[7] |
YANG Y , MA M . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds[J]. IEEE Transactions on Information Forensics and Security, 2016,11(4): 746-759.
|
[8] |
WANG B , YU S , LOU W ,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]// Conference on Computer Communications. 2014: 2112-2120.
|
[9] |
XU P , JIN H , WU Q ,et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277.
|
[10] |
XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(2): 340-352.
|
[11] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233.
|
[12] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. 2007: 321-334.
|
[13] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. 2006: 89-98.
|
[14] |
ZHENG Q , XU S , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]// IEEE Conference on Computer Communications. 2014: 522-530.
|
[15] |
YIN H , QIN Z , ZHANG J ,et al. Secure conjunctive multi-keyword search for multiple data owners in cloud computing[C]// The 22th IEEE International Conference on Parallel and Distributed Systems. 2016: 761-768.
|
[16] |
SUN W , YU S , LOU W ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198.
|
[17] |
LAYOUNI M , YOSHIDA M , OKAMURA S . Efficient multi- authorizer accredited symmetrically private information retrieval[C]// The 10th International Conference on Information and Communications Security. 2008: 387-402.
|
[18] |
SHAN Y , CAO Z . Extended attribute based encryption for private information retrieval[C]// The 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems. 2009: 702-707.
|
[19] |
DAN B , LYNN B , SHACHAM H . Short signatures from the weil pairing[J]. Journal of Cryptology, 2004,17(4): 297-319.
|