[1] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceedings of IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2002: 44-55.
|
[2] |
BONEH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 506-522.
|
[3] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2004: 31-45.
|
[4] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 965-976.
|
[5] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[6] |
张键红, 武梦龙, 王晶 ,等. 云环境下安全的可验证多关键词搜索加密方案[J]. 通信学报, 2021,42(4): 139-149.
|
|
ZHANG J H , WU M L , WANG J ,et al. Secure and verifiable multi-keyword searchable encryption scheme in cloud[J]. Journal on Communications, 2021,42(4): 139-149.
|
[7] |
SHACHAM H , WATERS B . Compact proofs of retrievability[J]. Journal of Cryptology, 2013,26(3): 442-483.
|
[8] |
GUO L F , LU B , LI X Y ,et al. A verifiable proxy re-encryption with keyword search without random oracle[C]// Proceedings of Ninth International Conference on Computational Intelligence and Security. Piscataway:IEEE Press, 2014: 474-478.
|
[9] |
YANG Y , MA M D . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-health clouds[J]. IEEE Transactions on Information Forensics and Security, 2016,11(4): 746-759.
|
[10] |
SUN W H , WANG B , CAO N ,et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(11): 3025-3035.
|
[11] |
WANG J F , CHEN X F , HUANG X Y ,et al. Verifiable auditing for outsourced database in cloud computing[J]. IEEE Transactions on Computers, 2015,64(11): 3293-3303.
|
[12] |
MIAO Y B , MA J F , LIU X M ,et al. VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner[J]. Peer-to-Peer Networking and Applications, 2018,11(2): 287-297.
|
[13] |
GUO Y , ZHANG C , JIA X H . Verifiable and forward-secure encrypted search using blockchain techniques[C]// Proceedings of 2020 IEEE International Conference on Communications (ICC). Piscataway:IEEE Press, 2020: 1-7.
|
[14] |
PENG Y G , CUI J T , PENG C G ,et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014,11(11): 100-113.
|
[15] |
郑东, 朱天泽, 郭瑞 . 基于区块链的多用户环境中公钥可搜索加密方案[J]. 通信学报, 2021,42(10): 140-152.
|
|
ZHENG D , ZHU T Z , GUO R . Public key searchable encryption scheme in blockchain-enabled multi-user environment[J]. Journal on Communications, 2021,42(10): 140-152.
|
[16] |
MA M M , HE D B , KUMAR N ,et al. Certificateless searchable public key encryption scheme for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2018,14(2): 759-767.
|
[17] |
张玉磊, 文龙, 王浩浩 ,等. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020,42(5): 1094-1101.
|
|
ZHANG Y L , WEN L , WANG H H ,et al. Certificateless authentication searchable encryption scheme for multi-user[J]. Journal of Electronics & Information Technology, 2020,42(5): 1094-1101.
|
[18] |
WU L B , ZHANG Y B , MA M M ,et al. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of things[J]. Annals of Telecommunications, 2019,74(7): 423-434.
|
[19] |
ZHENG Q J , LI X X , AZGIN A . CLKS:certificateless keyword search on encrypted data[C]// International Conference on Network and System Security. Berlin:Springer, 2015: 239-253.
|
[20] |
MIAO Y , WENG J , LIU X ,et al. Enabling verifiable multiple keywords search over encrypted cloud data[J]. Information Sciences, 2018,465(10): 21-37.
|
[21] |
田有亮, 骆琴 . 基于改进 Merkle-Tree 认证方法的可验证多关键词搜索方案[J]. 通信学报, 2020,41(9): 118-129.
|
|
TIAN Y L , LUO Q . Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method[J]. Journal on Communications, 2020,41(9): 118-129.
|
[22] |
GARG N , BAWA S . RITS-MHT:relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing[J]. Journal of Network and Computer Applications, 2017,84: 1-13.
|