[1] CHEN Kang,ZHENG Weimin.Cloud computing:system instances and current research[J].Journal of Software,2009,20(5):1337-1348.(in Chinese) 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. [2] SHEN Zhirong,XUE Wei,SHU Jiwu.Survey on the research and development of searchable encryption schemes[J].Journal of Software,2014,25(4):880-895.(in Chinese) 沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,25(4):880-895. [3] QIN Zhiguang,XU Jun,NIE Xuyun,et al.A survey of public-key encryption with keyword search[J].Journal of Cyber Security,2017,2(3):1-12.(in Chinese) 秦志光,徐骏,聂旭云,等.公钥可搜索加密体制综述[J].信息安全学报,2017,2(3):1-12. [4] SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:212-220. [5] LI Ying,MA Chunguang.Overview of searchable encryption research[J].Chinese Journal of Network and Information Security,2018,4(7):13-21.(in Chinese) 李颖,马春光.可搜索加密研究进展综述[J].网络与信息安全学报,2018,4(7):13-21. [6] BONEH D,CRESCENZO D G,OSTROVSKY R,et al.Public key encryption with keyword search[C]//Proceedings of EUROCRYPT’04.Berlin,Germany:Springer,2004:506-522. [7] BYUN J W,RHEE H S,PARK H A,et al.Off-line keyword guessing attacks on recent keyword search schemes over encry[C]//Proceedings of the 3nd Workshop on Secure Data Management.Berlin,Germany:Springer,2006:75-83. [8] PARK D J,KIM K,LEE P J.Public key encryption with conjunctive field keyword search[C]//Proceedings of International Conference on Information Security Applications.Berlin,Germany:Springer,2005:73-86. [9] WANG Gang,LI Feifei,WANG Yao.Designated server identity-based encryption with conjunctive keyword search scheme[J].Computer and Modernization,2017,33(4):118-121.(in Chinese) 王刚,李非非,王瑶.指定服务器的基于身份加密连接关键字搜索方案[J].计算机与现代化,2017,33(4):118-121. [10] WANG Bo.Research on index based searchable encryption technology in cloud environment[D].Chengdu:University of Electronic Science and Technology of China,2018.(in Chinese) 王勃.云环境下基于索引的可搜索加密技术研究[D].成都:电子科技大学,2018. [11] ABDALLA M,BELLARE M,CATALANO D,et al.Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[C]//Proceedings of CRYPTO’05.Berlin,Germany:Springer,2005:205-222. [12] ZHU Minhui.Research on identity based proxy searchable encryption scheme[D].Nanjing:Nanjing University of Posts and Telecommunications,2018.(in Chinese)朱敏惠.基于身份的代理可搜索加密方案的研究[D].南京:南京邮电大学,2018. [13] NIU Shufen,CHEN Lixia,LIU Wenke,et al.Proxy reencryption scheme supporting keyword search in email system[J].Computer Engineering,2020,46(6):136-143.(in Chinese)牛淑芬,陈俐霞,刘文科,等.电子邮件系统中支持关键字搜索的代理重加密方案[J].计算机工程,2020,46(6):136-143. [14] LI Hongbo,HUANG Qing,SHEN Jian,et al.Designated server identity-based authenticated encryption with keyword search for encrypted emails[J].Information Sciences,2019,481:330-343. [15] WU T Y,TSAI T T,TSENG Y M.Efficient searchable ID-based encryption with a designated server[J].Annals of Telecommunications,2014,69(7):391-402. [16] WANG Shaohui,HAN Zhijie,XIAO Fu,et al.Identity-based searchable encryption scheme with a designated tester[J].Journal on Communications,2014,35(7):22-32.(in Chinese)王少辉,韩志杰,肖甫,等.指定测试者的基于身份可搜索加密方案[J].通信学报,2014,35(7):22-32. [17] WATERS B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]//Proceedings of CRYPTO’09.Berlin,Germany:Springer,2009:619-636. [18] ZHANG Fangguo.From bilinear pairings to multilinear maps[J].Journal of Cryptologic Research,2016,3(3):211-228.(in Chinese)张方国.从双线性对到多线性映射[J].密码学报,2016,3(3):211-228. [19] ZⅡU Minhui,CHEN Yanli,HU Yuanyuan.Identity-based searchable encryption scheme supporting proxy re-encryption[J].Computer Engineering,2019,45(1):129-135,140.(in Chinese)朱敏惠,陈燕俐,胡媛媛.支持代理重加密的基于身份可搜索加密方案[J].计算机工程,2019,45(1):129-135,140. [20] The pairing-based cryptography library[EB/OL].[2019-06-20].http://crypto.stanford.edu/pbc/. |