[1] |
BONEH D, CRESCENZO G D, OSTROVSKY R, et al.Public Key Encryption with Keyword Search[C]//INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH. International Conference on the Theory and Applications of Cryptographic Techniques, May 2-6, 2004, Interlaken, Switzerland. Heidelberg: Springer, 2004: 506-522.
|
[2] |
RHEE H S, PARK J H, SUSILO W, et al.Trapdoor Security in a Searchable Public-key Encryption Scheme with a Designated Tester[J]. Journal of Systems and Software, 2010, 83(5): 763-771.
|
[3] |
ZHAO Yuanjie, CHEN Xiaofeng, MA Hua, et al.A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search[J]. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2012, 3(1/2): 72-81.
|
[4] |
LI Jin, WANG Qian, WANG Cong, et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]//IEEE. 29th Conference on Information Communications, March 14-19, 2010, San Diego. Washington: IEEE, 2010: 1-5.
|
[5] |
BAEK J, SAFAVI-NAINI R, SUSILO W.Public Key Encryption with Keyword Search Revisited[C]//Advanced Science Research Center. Computational Science and Its Applications-ICCSA 2008, June 30-July 3, 2008, Perugia, Italy. Heidelberg: Springer, 2008: 1249-1259.
|
[6] |
LIU Qin, WANG Guojun, WU Jie.An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing[C]//IEEE. 2009 International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC. Washington: IEEE, 2009: 715-720.
|
[7] |
RHEE H S, SUSILO W, KIM H J.Secure Searchable Public Key Encryption Scheme Against Keyword Guessing Attacks[J]. IEICE Electronics Express, 2009, 6(5): 237-243.
|
[8] |
LI Ming, YU Shucheng, CAO Ning, et al.Authorized Private Keyword Search over Encrypted Data in Cloud Computing[C]//IEEE. 31st International Conference on Distributed Computing Systems (ICDCS), June 20-24, 2011, Minneapolis, MN. Washington: IEEE, 2011: 383-392.
|
[9] |
LI Chen, LU Jiaheng, LU Yiming.Efficient Merging and Filtering Algorithms for Approximate String Searches[C]//IEEE. 24th International Conference on Data Engineering, April 7-12, 2008, Cancun. Washington: IEEE, 2008: 257-266.
|
[10] |
MENEZES A J, OKAMOTO T, VANSTONE S A.Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field[J]. Information Theory, IEEE Transactions on, 1993, 39(5): 1639-1646.
|
[11] |
赵洋,陈阳,熊虎,等. 云环境下一种可撤销授权的数据拥有性证明方案[J]. 信息网络安全,2015(8):1-7.
|