[1] WANG Yuding,YANG Jiahai,XU Cong,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,26(5):1129-1150.(in Chinese)王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150. [2] SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-55. [3] DAN B,CRESCENZO G D,OSTROVSKY R,et al.Public key encryption with keyword search[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2004:506-522. [4] LI Long.Research on access control based on attribute-based encryption in cloud manufacturing[D].Guilin:Guilin University of Electronic Technology,2018.(in Chinese)李龙.云制造中基于属性基加密的访问控制研究[D].桂林:桂林电子科技大学,2018. [5] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2005:457-473. [6] LI Shuang,XU Maozhi.Attribute-based public encryption with keyword search[J].Chinese Journal of Computers,2014,37(5):1017-1024.(in Chinese)李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,37(5):1017-1024. [7] LI Runhe,ZHENG Dong,ZHANG Yinghui,et al.Attribute-based encryption with multi-keyword search[C]//Proceedings of 2017 IEEE International Conference on Data Science in Cyberspace.Washington D.C.,USA:IEEE Computer Society,2017:172-177. [8] HUANG Haiping,DU Jianpeng,DAI Hua,et al.Multi-sever multi-keyword searchable encryption scheme based on cloud storage[J].Journal of Electronics and Information Technology,2017,39(2):389-396.(in Chinese)黄海平,杜建澎,戴华,等.一种基于云存储的多服务器多关键词可搜索加密方案[J].电子与信息学报,2017,39(2):389-396. [9] ZHENG Q J,XU S H,ATENIESE G.VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]//Proceedings of 2014 IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2014:522-530. [10] SUN Wenhai,YU Shucheng,LOU Wenjing,et al.Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(4):1187-1198. [11] LIN Peng,JIANG Jie,CHEN Tieming.Application of keyword searchable encryption in cloud[J].Journal on Communications,2015,36(S1):259-265.(in Chinese)林鹏,江颉,陈铁明.云环境下关键词搜索加密算法研究[J].通信学报,2015,36(S1):259-265. [12] SU Hang,ZHU Zhiqiang,SUN Lei.Research on searchable attribute based encryption in mobile cloud storage[J].Application Research of Computers,2017,34(12):3753-3757,3766.(in Chinese)苏航,朱智强,孙磊.移动云存储中基于属性的搜索加密方案研究[J].计算机应用研究,2017,34(12):3753-3757,3766. [13] CAO Ning,WANG Cong,LI Ming,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]//Proceedings of IEEE INFOCOM'11.Washington D.C.,USA:IEEE Press,2011:829-837. [14] SUN Wenhai,WANG Bing,CAO Ning,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(11):71-81. [15] JIANG Xiuxiu,YU Jia,YAN Jingbo,et al.Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data[J].Information Sciences,2017,403:22-41. [16] WANG Dan,CAO Zhenfu,DONG Xiaolei.Outsourcing attribute-based encryption with multi-keywords and similarity ranking search[C]//Proceedings of IEEE International Conference on Computer and Communications.Washington D.C.,USA:IEEE Press,2016:28-32. [17] NA Haiyang,YANG Geng,SHU Xiaowei.Multi-keyword ranked search method based on B+ tree[J].Computer Science,2017,44(1):149-154.(in Chinese)那海洋,杨庚,束晓伟.基于B+树的多关键字密文排序检索方法[J].计算机科学,2017,44(1):149-154. [18] YAN Xiaolong,PANG Xiaoqiong,REN Mengqi.Multi-keyword ranked search method supporting dynamic update[J].Computer Engineering and Design,2018,39(4):901-906.(in Chinese)严小龙,庞晓琼,任孟琦.支持动态更新的多关键词密文排序检索[J].计算机工程与设计,2018,39(4):901-906. [19] SCHEUERMANN P,OUKSEL M.Multidimensional B-trees for associative searching in database systems[J].Information Systems,1982,7(2):123-137. [20] YANG Yan.Research on multi-mechanism attribute encryption technology[D].Beijing:Beijing Jiaotong University,2018.(in Chinese)杨艳.多机构属性加密技术研究[D].北京:北京交通大学,2018. [21] ONDREICKA M,POKORN J.Extending Fagin's algorithm for more users based on multidimensional B-tree[C]//Proceedings of the 12th East European Conference on Databases and Information Systems.Pori,Finland:DBLP,2008:199-214. [22] LI Zuohui,CHEN Xingyuan.ABE scheme of fast decryption with generalized wildcards[J].Computer Engineering,2016,42(8):96-100.(in Chinese)李作辉,陈性元.具有扩展通配符的快速解密ABE方案[J].计算机工程,2016,42(8):96-100. [23] SUN Jin,WANG Xiaojing,WANG Shangping,et al.Verifiable multi-keyword search encryption scheme with attribute revocation[J].Journal of Electronics and Information Technology,2019,41(1):53-60.(in Chinese)孙瑾,王小静,王尚平,等.支持属性撤销的可验证多关键词搜索加密方案[J].电子与信息学报,2019,41(1):53-60. |