[1] SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Berkeley,USA:[s.n.],2000:44-55. [2] DAN B,CRESCENZO G D,OSTROVSKY R,et al.Public key encryption with keyword search[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2004:506-522. [3] HUANG Haiping,DU Jianpeng,DAI Hua,et al.Multi-sever multi-keyword searchable encryption scheme based on cloud storage[J].Journal of Electronics and Information Technology,2017,39(2):389-396.(in Chinese) 黄海平,杜建澎,戴华,等.一种基于云存储的多服务器多关键词可搜索加密方案[J].电子与信息学报,2017,39(2):389-396. [4] MIAO Yinbin,MA Jianfeng.VKSE-MO:verifiable keyword search over encrypted data in multiowner settings[J].SCIENCE CHINA Information Sciences,2017,60(12):108-202. [5] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473. [6] KAUSHIK K,VARADHARAJAN V.Multi-user attribute based searchable encryption[C]//Proceedings of the 14th IEEE International Conference on Mobile Data Management.Washington D.C.,USA:IEEE Press,2013:200-207. [7] ZHENG Q J,XU S H,ATENIESE G.VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]//Proceedings of 2014 IEEE Conference on Computer Communications.Toronto,Canada:IEEE Press,2014:522-530. [8] SUN Wenhai,YU Shucheng,LOU Wenjing,et al.Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(4):1187-1198. [9] LIN Peng,JIANG Jie,CHEN Tieming.Application of keyword searchable encryption in cloud[J].Journal of Communications,2015,36(S1):259-265.(in Chinese) 林鹏,江颉,陈铁明.云环境下关键词搜索加密算法研究[J].通信学报,2015,36(S1):259-265. [10] SU Hang,ZHU Zhiqiang,SUN Lei.Research on searchable attribute based encryption with mobile cloud storage[J].Application Research of Computers,2017,34(12):3753-3757,3766.(in Chinese) 苏航,朱智强,孙磊.移动云存储中基于属性的搜索加密方案研究[J].计算机应用研究,2017,34(12):3753-3757,3766. [11] ZHONG Hong,CUI Jie.Efficient and verifiable muti-authority attribute based encryption scheme[J].Journal of Software,2018,29(7):2006-2017.(in Chinese) 仲红,崔杰.高效且可验证的多授权机构属性基加密方案[J].软件学报,2018,29(7):2006-2017. [12] CAO Suzhen,DU Xialing,WANG Youchen.Multi-server verifiable attribute-based multi-keyword ranked retrieval scheme[J].Computer Engineering,2019,46(3):120-128.(in Chinese) 曹素珍,杜霞玲,王友琛.多服务器可验证的属性基多关键字排序检索方案[J].计算机工程,2019,46(3):120-128. [13] CHEN Yanli,YANG Huashan.CP-ABE based searchable encryption with attribute revocation [J].Journal of Chongqing University of Posts and Telecommunications,2016,28(4):545-554.(in Chinese)陈燕俐,杨华山.可支持属性撤销的基于CP-ABE可搜索加密方案[J].重庆邮电大学学报,2016,28(4):545-554. [14] WU Qiying,MA Jianfeng,SUN Hui,et al.Multi-keyword search over encrypted data with user revocation[J].Journal of Communications,2017,38(8):183-193.(in Chinese)伍祈应,马建峰,孙辉,等.支持用户撤销的多关键字密文查询方案[J].通信学报,2017,38(8):183-193. [15] SUN Jin,WANG Xiaojing.Verifiable multi-keyword search encryption scheme with attribute revocation[J].Journal of Electronics and Information Technology,2019,41(1):58-65.(in Chinese)孙瑾,王小静.支持属性撤销的可验证多关键词搜索加密方案[J].电子与信息学报,2019,41(1):58-65. [16] SHAO Qifeng,JIN Cheqing,ZHANG Zhao,et al.Blockchian:architecture and research progress[J].Chinese Journal of Computers,2018,41(5):969-987.(in Chinese)邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018,41(5):969-987. [17] LI Huige,TIAN Haibo,ZHANG Fangguo,et al.Block chain based searchable symmetric encryption scheme[J].Computers and Electrical Engineering,2018,73:32-45. [18] ZHANG Yinghui,HU Jiangang,et al.KSE:trustworthy keyword search over encrypted data with two-side[J].IEEE Access,2018,6:31077-31087. [19] NIU Shufen,WANG Jinfeng,WANG Bobin,et al.Ciphertext sorting search scheme based on B+ tree index structure on blockchain[J].Journal of Electronics and Information Technology,2019,41(10):2409-2415.(in Chinese)牛淑芬,王金风,王伯彬,等.区块链上基于B+树索引结构的密文排序搜索方案[J].电子与信息学报,2019,41(10):2409-2415. [20] GUO Lifeng,LU Bo.Efficient proxy re-encryption with keyword search scheme[J].Journal of Computer Research and Development,2014,51(6):1221-1228.(in Chinese)郭丽峰,卢波.有效的带关键字搜索的代理重加密方案[J].计算机研究与发展,2014,51(6):1221-1228. [21] ZUO Cong SHAO Jun.CCA-secure ABE with outsourced decryption for fog computing[J].Future Generation Computer Systems,2018,78:730-738. [22] HUANG Rufen,NONG Jiang,HUANG Zhenjie.An efficient certificateless blind signature scheme[J].Computer Engineering,2013,39(2):130-136.(in Chinese)黄茹芬,农强,黄振杰.一个高效的无证书盲签名方案[J].计算机工程,2013,39(2):130-136. |