[1] SONG D X.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington,D.C.,USA:IEEE Computer Society,2000:44-55. [2] KAMARA S,PAPAMANTHOU C.Parallel and dynamic searchable symmetric encryption[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2013:258-274. [3] CURTMOLA R,JUAN G,SENY K,et al.Searchable symmetric encryption:improved definitions and efficient constructions[J].Journal of Computer Security,2011,19(5):895-934. [4] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:254-265. [5] WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]//Proceedings of International Workshop on Public Key Cryptography.Berlin,Germany:Springer,2011:978-986. [6] LAI J,DENG R H,GUAN C,et al.Attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354. [7] SHIRAISHI Y,NOMURA K,MOHRI M,et al.Attribute revocable attribute-based encryption with forward secrecy for fine-grained access control of shared data[J].IEICE Transactions on Information and Systems,2017,100(10):2432-2439. [8] BALU A,KUPPUSAMY K.An expressive and provably secure ciphertext-policy attribute-based encryption[J].Information Sciences,2014,276:354-362. [9] LIU Z,JIANG Z,WANG X,et al.Practical attribute-based encryption:outsourcing decryption,attribute revocation and policy updating[J].Journal of Network and Computer Applications,2018,108:112-113. [10] 曹素珍,杜霞玲,杨小东,等.可验证混合存储属性基多关键字密文检索方案[J].计算机工程,2020,46(11):181-186,193. CAO S Z,DU X L,YANG X D,et al.Attribute-based multi-keyword ciphertext retrieval scheme using verifiable hybrid storage[J].Computer Engineering,2020,46(11):181-186,193.(in Chinese) [11] MICHALAS A.The lord of the shares:combining attribute-based encryption and searchable encryption for flexible data sharing[C]//Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.New York,USA:ACM Press,2019:146-155. [12] YIN H,ZHANG J,XIONG Y,et al.CP-ABSE:a ciphertext- policy attribute-based searchable encryption scheme[J].IEEE Access,2019,7:5682-5694. [13] 宋衍,韩臻,陈栋,等.支持关键词任意连接搜索的属性加密方案[J].通信学报,2016,37(8):77-85. SONG Y,HAN Z,CHEN D,et al.Supporting key-word arbitrary connection search encryption scheme[J].Journal on Communications,2016,37(8):77-85.(in Chinese) [14] 陈燕俐,杨华山.可支持属性撤销的基于CP-ABE可搜索加密方案[J].重庆邮电大学学报(自然科学版),2016,28(4):545-554. CHEN Y L,YANG H S.Searchable encryption scheme based on CP-ABE supporting attribute revocation[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(4):545-554.(in Chinese) [15] 朱智强,苏航,孙磊,等.云存储中基于属性的关键词搜索加密方案研究[J].网络与信息安全学报,2017,3(11):5-15. ZHU Z Q,SU H,SUN L,et al.Research on attribute based keyword search encryption scheme in cloud storage[J].Chinese Journal of Network and Information Security,2017,3(11):5-15.(in Chinese) [16] ELTAYIEB N,ELHABOB R,HASSAN A,et al.An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid[J].Journal of Systems Architecture,2019,98:165-172. [17] CUI J,ZHOU H,XU Y,et al.OOABKS:online/offline attribute-based encryption for keyword search in mobile cloud[J].Information Sciences,2019,489:63-77. [18] SUN W,YU S,LOU W,et al.Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J].IEEE Transactions on Parallel & Distributed Systems,2016,27(4):1187-1198. [19] 孙瑾,王小静,王尚平,等.支持属性撤销的可验证多关键词搜索加密方案[J].电子与信息学报,2019,41(1):58-65. SUN J,WANG X J,WANG S P,et al.Verifiable multi keyword search encryption scheme supporting attribute revocation[J].Journal of Electronics & Information Technology,2019,41(1):58-65.(in Chinese) [20] 邓志辉,王少辉,王平.基于合数阶双线性对的可搜索加密方案分析与改进[J].计算机工程,2020,46(9):123-128,135. DENG Z H,WANG S H,WANG P.Analysis and improvement of searchable encryption scheme based on composite-order bilinear pairs[J].Computer Engineering,2020,46(9):123-128,135.(in Chinese) [21] WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[EB/OL].[2021-02-01].https://eprint.iacr.org/2008/290.pdf. |