参考文献
[1]Song X D,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-55.
[2]方黎明.带关键字搜索公钥加密的研究[D].南京:南京航空航天大学,2012.
[3]Boneh D,Crescenzo G,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]//Proceedings of the 23rd Annual Eurocrypt Conference.Interlaken,Switzerland:IACR,2004:506-522.
[4]Abdalla M,Bellare M,Catalano D,et al.Searchable Encryption Revisited:Consistency Properties,Relation to Anonymous IBE,and Extensions[J].Journal of Cryptology,2008,21(3):350-391.
[5]Khader D.Public Key Encryption with Keyword Search Based on K-resilient IBE[C]//Proceedings of Inter-national Conference on Computational Science and Its Applications.Berlin,Germany:Springer-Verlag,2006:298-308.
[6]Crescenzo G D,Saraswat V.Public Key Encryption with Searchable Keywords Based on Jacobi Symbols[C]//Proceedings of the 8th International Conference on Cryptology in India.Berlin,Germany:Springer-Verlag,2007:282-296.
[7]Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System[C]//Proceedings of the 1st Inter-national Conference on Pairing-based Cryptography.Berlin,Germany:Springer-
Verlag,2007:2-22.
[8]Baek J,Safiavi-Naini R,Susilo W.Public Key Encryption with Keyword Search Revisited[C]//Proceedings of International Conference on Computa-tional Science and Its Applications.Berlin,Germany:Springer-Verlag,2008:1249-1259.
(下转第133页)
(上接第125页)
[9]Rhee H S,Park J H,Susilo W,et al.Improved Searchable Public Key Encryption with Designated Tester [C]//Proceedings of the 4th International Sym-posium on Information,Computer,and Communications Security.New York,USA:ACM
Press,2009:376-379.
[10]Zhao Yuanjie,Chen Xiaofeng,Ma Hua,et al.A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search[J].Journal of Wireless Mobile Net-works,Ubiquitous Computing,and Dependable Appli-cations,2012,3(1/2):72-81.
[11]Yang Haomiao,Xu Chunxiang,Zhao Hongtian.An Efficient Public Key Encryption with Keyword Scheme not Using Pairing[C]//Proceedings of the 1st Inter-national Conference on Instrumentation,Measurement,Computer,Communication and
Control.Washington D.C.,USA:IEEE Press,2011:900-904.
[12]Luo Wenjun,Tan Jianming.Public Key Encryption with Keyword Search Based on Factoring[C]//Proceedings of the 2nd International Conference on Cloud Computing and Intelligent Systems.Washington D.C.,USA:IEEE Press,2012:1245-1247.
[13]Xia Qi,Ni Jianbing,Kanpogninge A,et al.Searchable Public-key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage[J].Journal of Universal Computer Science,2015,21(3):440-453.
[14]Shao Zhiyi,Yang Bo,Zhang Wenzheng,et al.Secure Medical Information Sharing in Cloud Computing[J].Technology and Health Care,2015,23(s1):133-137.
[15]刘鹏亮,俎龙辉,白翠翠,等.一种可验证的公钥可搜索加密方案[J].计算机工程,2014,40(11):118-120.
编辑刘冰 |