[1] BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Public key encryption with keyword search[EB/OL].[2018-06-25].http://crypto.stanford.edu/~dabo/papers/encsearch.pdf. [2] WATERS B R,BALFANZ D,DURFEE G,et al.Building an encrypted and serachable audit log[EB/OL].[2018-06-25].http://www.cs.utexas.edu/users/bwaters/publications/papers/audit_log.pdf. [3] CURTMOLA R,GARAY J,KAMARA S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:79-88. [4] GU Chunxiang,ZHU Yuefei,PAN Heng.Efficient public key encryption with keyword search schemes from pairings[EB/OL].[2018-06-25].https://eprint.iacr.org/2006/108.pdf. [5] TANG Qiang,CHEN Liqun.Public-key encryption with registered keyword search[C]//Proceedings of European Conference on Public Key Infrastructures.Berlin,Germany:Springer,2009:163-178. [6] LEWKO A.Tools for simulating features of composite order bilinear groups in the prime order setting[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2012:318-335. [7] LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[C]//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2010:62-91. [8] FANG Liming,SUSILO W,GE Chunpeng,et al.Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J].Information Sciences,2013,238:221-241. [9] LIU Chang,ZHU Liehuang,WANG Mingzhong,et al.Search pattern leakage in searchable encryption:attacks and new construction[J].Information Sciences,2014,265:176-188. [10] WANG Xiaofen,WU Yi,CHEN Rongmao,et al.Secure channel free id-based searchable encryption for peer-to-peer group[J].Journal of Computer Science and Technology,2016,31(5):1012-1027. [11] ZHOU Yousheng,XU Guangxia,WANG Yong,et al.Chaotic map-based time-aware multi-keyword search scheme with designated server[J].Wireless Communications and Mobile Computing,2016,16(13):1851-1858. [12] 徐磊,许春根,蔚晓玲.云存储上高效安全的数据检索方案[J].密码学报,2016,3(4):330-339. [13] HUANG Qiong,LI Hongbo.An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J].Information Sciences,2017,403/404:1-14. [14] 刘鹏亮,俎龙辉,白翠翠,等.一种可验证的公钥可搜索加密方案[J].计算机工程,2014,40(11):118-120. [15] 林楠,费益军,王宇飞,等.云环境下一种排序非对称的可搜索加密方案[J].计算机工程,2015,41(11):190-193. [16] WATERS B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]//Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology.Berlin,Germany:Springer,2009:619-636. [17] FANG Liming,SUSILO W,GE Chunpeng,et al.A secure channel free public key encryption with keyword search scheme without random oracle[C]//Proceedings of the 8th International Conference on Cryptology and Network Security.Berlin,Germany:Springer,2009:248-258. [18] CHEN Zhenhua,WU Chunying,WANG Daoshun,et al.Conjunctive keywords searchable encryption with efficient pairing,constant ciphertext and short trapdoor[C]//Proceedings of Pacific-Asia Workshop on Intelligence and Security Informatics.Berlin,Germany:Springer,2012:176-189. |