[1] |
DAWN S D , SONG D , WAGNER A P ,et al. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Security and Privacy Symposium. Piscataway:IEEE Press, 2000: 44-45.
|
[2] |
BONEH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 506-522.
|
[3] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption :improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[4] |
WANG P , WANG H , PIEPRZYK J . Threshold privacy preserving keyword searches[C]// Conference on Sofsem:Theory & Practice of Computer Science. Berlin:Springer, 2008: 646-658.
|
[5] |
YUAN K , LIU Z L , JIA C F ,et al. Public key timed-release searchable encryption in one-to-many scenarios[J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015,43(4): 760-768.
|
[6] |
ZHONG H , CUI J , SHI R H ,et al. Many-to-one homomorphic e-ncryption scheme[J]. Security & Communication Networks, 2016,9(10): 1007-1015.
|
[7] |
TANG Q , CHEN L Q . Public-key encryption with registered keyword search[C]// 6th European Workshop Public Key Infrastructures. Berlin:Springer, 2009: 163-178.
|
[8] |
FANG L M , SUSILO W , GE C ,et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Sciences, 2013,238: 221-241.
|
[9] |
XU P , JIN H , WU Q ,et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277.
|
[10] |
CHEN R , MU Y , YANG G ,et al. A new general framework for secure public key encryption with keyword search[C]// Australasian Conference on Information Security and Privacy. Berlin:Springer, 2015: 59-76.
|
[11] |
SHAO Z Y , YANG B . On security against the server in designated tester public key encryption with keyword search[J]. Information Processing Letters, 2015,115(12): 957-961.
|
[12] |
CHEN R , MU Y , YANG G ,et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2016,11(4): 789-798.
|
[13] |
HUANG Q , LI H . An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J]. Information Sciences, 2017( 403-404): 1-14.
|
[14] |
KANG Y , LIU Z . A fully secure verifiable and out sourced decryption ranked searchable encryption scheme supporting synonym query[C]// IEEE Second International Conference on Data Science in Cyberspace. Piscataway:IEEE Press, 2017: 223-231.
|
[15] |
WU L , CHEN B , ZEADALLY S ,et al. An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage[J]. Soft Computing, 2018,22(23): 7685-7696.
|
[16] |
WU L B , ZHANG Y B , MA M M ,et al. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of things[J]. Annales des Télécommunications, 2019,74(7-8): 423-434.
|
[17] |
MA M M , HE D B , KUMAR N ,et al. Certificateless searchable public key encryption scheme for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2018,14(2): 759-767.
|
[18] |
LU Y , LI J G . Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems[J]. Cluster Computing, 2019,22(1): 285-299.
|
[19] |
LI H G , ZHANG F G , HE J J ,et al. A searchable symmetric encryption scheme using blockchain[J]. CoRR:abs/1711.01030, 2017
|
[20] |
LI H G , TIAN H B , ZHANG F G ,et al. Blockchain-based searchable symmetric encryption scheme[J]. Computers & Electrical Engineering, 2019(73): 32-45.
|
[21] |
CHEN L X , LEE W K , CHANG C C ,et al. Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer System, 2019(95): 420-429.
|