[1] 冯登国,张 敏,张 妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[2] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public Key Encryption With Keyword Search[C]//Proceedings of the 24th Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques.Santa Barbara,USA:[s.n.],2004:506-522.
[3] Dong J P,Kihyun K,Pil J L.Public Key Encryption with Conjunctive Field Keyword Search[C]//Proceedings of the 6th International Workshop on Information Security Applications.Jeju Island,Korea:[s.n.],2005:73-86.
[4] Crescenzo D,Saraswat G V.Public Key Encryption with Searchable Key-words Based on Jacobi Symbols[C]// Proceedings of the 5th International Conference on Information Security Applications.Berlin,Germany:[s.n.],2007:1086-1095.
[5] Gu Chunxiang,Zhu Yuefei,Pan Heng.Efficient Public Key Encryption with Keyword Search Schemes from Pairings[M]//Pei Dingyi,Yung M,Lin Dongdai.Information Security and Cryptology.Berlin,Germany:Springer,2007:372-383.
[6] Michel A,Mihir B,Dario C,et al.Searchable Encryption Revisited:Consistency Properties,Relation to Anonymous IBE,and Extensions[J].Journal of Cryptology,2008,21(3):350-391.
[7] Jin W B,Hyun S R,Hyun A P,et al.Off-line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data[M]//Jonker W,Petkovic M.Secure Data Management.Berlin,Germany:Springer,2006:75-83.
[8] Baek J,Safavi-Naini R,Susilo W.Public Key Encryption with Keyword Search Revisited[C]//Proceedings of International Conference on Computational Science and Its Applications.Berlin,Germany:Springer-Verlag,2008:1249-1259.
[9] Yau W C,Heng S H,Goi B M.Off-line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes[C]//Proceedings of the 5th International Conference on Autonomic and Trusted Computing.Oslo,Norway:[s.n.],2008:100-105.
[10] Hyun S R,Jong H P,Willy S,et al.Trapdoor Security in a Searchable Public-key Encryption Scheme with a Designated Tester[J].Journal of Systems and Software,2010,83(5):763-771.
[11] Dong Changyu,Russello G,Dulay N.Shared and Searchable Encrypted Data for Untrusted Servers[C]//Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security.Berlin,Germany:Springer-Verlag,2011:127-143.
[12] Hu Chengyu,Liu Pengtao.An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions[J].Journal of Computers,2012,7(3):716-723.
[13] Liu Qin,Wang Guojun,Wu Jie.Secure and Privacy Preserving Keyword Searching for Cloud Storage Services[J].Journal of Network and Computer Applications,2012,35(3):927-933.〖HJ0.95mm〗
[14] Zhao Yuanjie,Chen Xiaofeng,Ma Hua,et al.A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search[J].Journal of Wireless Mobile Networks,Ubiquitous Computing,and Dependable Applications,2012,3(1/2):72-81.
[15] Wang S,Liu W,Xie Q.Certificateless Signature Scheme Without Bilinear Pairings[J].International Journal of Communication Systems,2012,33(4):93-98.
[16] Victor S.Sequences of Games:A Tool for Taming Complexity in Security Proofs[EB/OL].(2012-05-16).http://eprint.iacr.org/2004/332.
[17] 司光东,杨加喜,谭示崇,等.RSA算法中的代数结构[J].电子学报,2011,39(1):242-246.
[18] Pascal P.Public-key Cryptosystems Based on Composite Degree Residuosity Classes[C]//Proceedings of International Conference on the Theory and Application of Cryptographic Techniques.Prague,Czech Republic:ACM Press,1999:223-238.
编辑 陆燕菲 |