参考文献
[1]Song D X,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-55.
[2]Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]//Proceedings of Advances in Cryptology-Eurocrypt.Berlin,Germany:Springer-Verlag,2004:506-522.
[3]Baek J,Safavinaini R,Susilo W.Public Key Encryption with Keyword Search Revisited[J].Lecture Notes in Computer Science,2005,(3):1249-1259.
[4]Rhee H S,Park J H,Susilo W,et al.Trapdoor Security in a Searchable Public-key Encryption Scheme with a Designated Tester[J].Journal of Systems & Software,2010,83(5):763-771.
(下转第29页)
(上接第22页)
[5]Dan B,Waters B.Conjunctive,Subset,and Range Queries on Encrypted Data[C]//Proceedings of the 4th Conference on Theory of Cryptography.Berlin,Germany:Springer-Verlag,2007:535-554.
[6]Katz J,Sahai A,Waters B.Predicate Encryption Supporting Disjunctions,Polynomial Equations,and Inner Products[J].Journal of Cryptology,2013,26(2):191-224.
[7]Okamoto T,Takashima K.Hierarchical Predicate Encryption for Inner-products[C]//Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security:Advances in
Cryptology.Berlin,Germany:Springer-Verlag,2009:214-231.
[8]Li Jin,Wang Qian,Wang Cong,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]//Proceedings of INFOCOM’10.Washington D.C.,USA:IEEE Press,2010:1-5.
[9]Wang Cong,Cao Ning,Li Jin,et al.Secure Ranked Keyword Search over Encrypted Cloud Data[C]//Proceedings of the 30th IEEE International Conference on Distributed Computing Systems.Washington D.C.,USA:IEEE Press,2010:253-262.
[10]Cao Ning,Wang Cong,Li Ming,et al.Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]//Proceedings of INFOCOM’11.Washington D.C.,USA:IEEE Press,2011:829-837.
[11]Hu Chengyu,Liu Pengtao.Public Key Encryption with Ranked Multi-keyword Search[C]//Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems.Washington D.C.,USA:IEEE Press,2013:109-113.
[12]黄汝维,桂小林,余思,等.云环境中支持隐私保护的可计算加密方法[J].计算机学报,2011,34(12):2391-2402.
[13]慎耀辉,王晓明.基于链路层位置隐私的改进匿名认证方案[J].计算机工程,2014,40(7):82-86.
[14]李超群.名词性属性距离度量问题及其应用研究[D].武汉:中国地质大学,2012.
[15]赖俊祚.可证安全的公钥加密和无证书公钥加密的研究[D].上海:上海交通大学,2009.
编辑刘冰 |