[1] SONG D X, WAGNER D, PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C., USA:IEEE Press, 2000:1-10. [2] GOH E J.Secure indexes[EB/OL].[2021-08-24].http://xenon.stanford.edu/~eujin/papers/secureindex/2004mar-secureindex.pdf. [3] BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM, 1970, 13(7):422-426. [4] BONEH D, DI CRESCENZO G, OSTROVSKY R, et al.Public key encryption with keyword search[EB/OL] [2021-08-24].https://link.springer.com/content/pdf/10.1007% 2F978-3-540-24676-3_30.pdf. [5] BONEH D, FRANKLIN M.Identity-based encryption from the Weil pairing[C]//Proceedings of International Conference on Advances in Cryptology.Berlin, Germany:Springer, 2001:213-229. [6] ABDALLA M, BELLARE M, CATALANO D, et al.Searchable encryption revisited:consistency properties, relation to anonymous IBE, and extensions[J].Journal of Cryptology, 2008, 21(3):350-391. [7] TIAN X X, WANG Y.ID-based encryption with keyword search scheme from bilinear pairings[C]//Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing.Washington D.C., USA:IEEE Press, 2008:1-4. [8] SIAD A.Anonymous identity-based encryption with distributed private-key generator and searchable encryption[C]//Proceedings of the 5th International Conference on New Technologies, Mobility and Security.Washington D.C., USA:IEEE Press, 2012:1-8. [9] XU P, JIN H, WU Q H, et al.Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J].IEEE Transactions on Computers, 2013, 62(11):2266-2277. [10] WU T Y, TSAI T T, TSENG Y M.Efficient searchable ID-based encryption with a designated server[J].Annals of Telecommunications-Annales Des Telecommunications, 2014, 69(7/8):391-402. [11] 李经纬, 贾春福, 刘哲理, 等.可搜索加密技术研究综述[J].软件学报, 2015, 26(1):109-128. LI J W, JIA C F, LIU Z L, et al.Survey on the searchable encryption[J].Journal of Software, 2015, 26(1):109-128.(in Chinese) [12] XU P, WU Q H, WANG W, et al.Generating searchable public-key ciphertexts with hidden structures for fast keyword search[J].IEEE Transactions on Information Forensics and Security, 2015, 10(9):1993-2006. [13] RAMYA C P, VIPIN K M.Comparison of different techniques for keyword searching over encrypted data[C]//Proceedings of Online International Conference on Green Engineering and Technologies.Washington D.C., USA:IEEE Press, 2016:1-4. [14] HUANG Q, LI H B.An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J].Information Sciences, 2017, 403/404:1-14. [15] ZHANG X J, XU C X, MU L M, et al.Identity-based encryption with keyword search from lattice assumption[J].China Communications, 2018, 15(4):164-178. [16] JIANG P, GUO F C, MU Y.Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems[J].Theoretical Computer Science, 2019, 767(45):51-72. [17] LI H B, HUANG Q, SHEN J, et al.Designated-server identity-based authenticated encryption with keyword search for encrypted emails[J].Information Sciences, 2019, 481(19):330-343. [18] 朱敏惠, 陈燕俐, 胡媛媛.支持代理重加密的基于身份可搜索加密方案[J].计算机工程, 2019, 45(1):129-135, 140. ZHU M H, CHEN Y L, HU Y Y.Identity-based searchable encryption scheme supporting proxy re-encryption[J].Computer Engineering, 2019, 45(1):129-135, 140.(in Chinese) [19] 倪绿林, 许春根.基于身份的动态可搜索加密方案[J].计算机工程, 2019, 45(1):136-140. NI L L, XU C G.Dynamic searchable encryption scheme based on identity[J].Computer Engineering, 2019, 45(1):136-140.(in Chinese) [20] 牛淑芬, 杨平平, 谢亚亚, 等.电子邮件系统中指定服务器的关键字搜索加密方案[J].计算机工程, 2020, 46(10):137-142, 150. NIU S F, YANG P P, XIE Y Y, et al.Keyword search encryption scheme for designated server in email system[J].Computer Engineering, 2020, 46(10):137-142, 150.(in Chinese) [21] ZHANG X J, HUANG C, GU D W, et al.BIB-MKS:post-quantum secure biometric identity-based multi-keyword search over encrypted data in cloud storage systems[J].IEEE Transactions on Services Computing, 2021, 99(14):1-10. [22] LIU Z Y, TSENG Y F, TSO R, et al.Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems[J].IEEE Systems Journal, 2021, 99(15):1-12. [23] LEE E, LEE H S, PARK C M.Efficient and generalized pairing computation on abelianvarieties[J].IEEE Transactions on Information Theory, 2009, 55(4):1793-1803. [24] CHATTERJEE S, MENEZES A.On cryptographic protocols employing asymmetric pairings-the role of Ψ revisited[J].Discrete Applied Mathematics, 2011, 159(13):1311-1322. [25] 彭长根, 张小玉, 丁红发, 等.基于Cocks身份密码体制的高效签密方案[J].通信学报, 2020, 41(12):128-138. PENG C G, ZHANG X Y, DING H F, et al.Efficient signcryption scheme based on Cocks' identity cryptosystem[J].Journal on Communications, 2020, 41(12):128-138.(in Chinese) [26] BARRETO P S L M, NAEHRIG M.Pairing-friendly elliptic curves of prime order[C]//Proceedings of International Conference on Selected Areas.Berlin, Germany:Springer, 2006:319-331. |