[1] SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-60. [2] CHANG Y C,MITZENMACHER M.Privacy preserving keyword searches on remote encrypted data[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Washington D.C.,USA:IEEE Press,2005:442-455. [3] CURTMOLA R,GARAY J,KAMARA S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:895-934. [4] DAN B,CRESCENZO G D,OSTROVSKY R,et al.Public key encryption with keyword search[J].Lecture Notes in Computer Science,2004,3027(16):506-522. [5] JIN W B,DONG H L,LIM J.Efficient conjunctive keyword search on encrypted data storage system[C]//Proceedings of European Conference on Public Key Infrastructure:Theory and Practice.Berlin,Germany:Springer,2006:184-196. [6] RYU E K,TAKAGI T.Efficient conjunctive keyword-searchable encryption[C]//Proceedings of International Conference on Advanced Information Networking and Applications Workshops.Washington D.C.,USA:IEEE Computer Society,2007:409-414. [7] KERSCHBAUM F.Secure conjunctive keyword searches for unstructured text[C]//Proceedings of International Conference on Network and System Security.[S.l.]:DBLP,2011:285-289. [8] LIU Chang,ZHU Liehuang,LI Longyijia,et al.Fuzzy keyword search on encrypted cloud storage data with small index[C]//Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems.Washington D.C.,USA:IEEE Press,2011:269-273. [9] CAO Ning,WANG Cong,LI Ming,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233. [10] CHUAH M,HU W.Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]//Proceedings of International Conference on Distributed Computing Systems Workshops.Washington D.C.,USA:IEEE Computer Society,2011:273-281. [11] DAN B,BOYEN X.Efficient selective-ID secure identity-based encryption without random oracles[J].Lecture Notes in Computer Science,2004,3027(4):172-192. [12] DONG J P,CHA J,LEE P J.Searchable keyword-based encryption[EB/OL].[2019-02-15].https://eprint.iacr.org/2005/367.pdf. [13] BELLARE M,BOLDYREVA A,O’NEILL A.Deterministic and efficiently searchable encryption[C]//Proceedings of International Cryptology Conference.Berlin,Germany:Springer,2007:535-552. [14] XU Lei,XU Chungen,YU Xiaoling.Secure and efficient data retrieval scheme using searchable encryption in cloud[J].Journal of Cryptologic Research,2016,3(4):330-339.(in Chinese) 徐磊,许春根,蔚晓玲.云存储上高效安全的数据检索方案[J].密码学报,2016,3(4):330-339. [15] WANG Qian,XIONG Shuming.A verifiable access control scheme for mobile cloud storage[J].Computer Engineering,2016,42(5):35-41.(in Chinese) 王谦,熊书明.一种面向移动云存储的可验证访问控制方案[J].计算机工程,2016,42(5):35-41. [16] CHEN Kang,ZHENG Weimin.Cloud computing:system examples and research status[J].Journal of Software,2009,20(5):1337-1348.(in Chinese) 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. [17] FU Yingxun,LUO Shengmei,SHU Jiwu.Survey of secure cloud storage system and key technologies[J].Journal of Computer Research and Development,2013,50(1):136-145.(in Chinese) 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1):136-145. [18] WANG Shangping,LIU Lijun,ZHANG Yaling.An efficient conjunctive keyword searchable encryption scheme[J].Journal of Electronics and Information Technology,2013,35(9):2266-2271.(in Chinese) 王尚平,刘利军,张亚玲.一个高效的基于连接关键词的可搜索加密方案[J].电子与信息学报,2013,35(9):2266-2271. [19] GOLLE P.Secure conjunctive keyword search over encrypted data[C]//Proceedings of 2004 Applied Cryptography and Network Security Conference.Washington D.C.,USA:IEEE Press,2004:52-63. [20] BALLARD L,KAMARA S,MONROSE F.Achieving efficient conjunctive keyword searches over encrypted data[C]//Proceedings of the 7th International Con-ference on Information and Communications Security.Berlin,Germany:Springer,2005:414-426. [21] KERSCHBAUM F.Secure conjunctive keyword searches for unstructured text[C]//Proceedings of the 5th International Conference on Network and System Security.Washington D.C.,USA:IEEE Press,2011:58-70. |