共 12 条
- [1] Dong X.-L., Zhou J., Cao Z.-F., Research advances on secure searchable encryption, Journal of Computer Research and Development, 54, 10, pp. 2107-2120, (2017)
- [2] Song D.X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, (2000)
- [3] Dan B., Crescenzo G.D., Ostrovsky R., Et al., Public Key Encryption with Keyword Search, pp. 506-522, (2004)
- [4] Goh E.J., Secure indexes
- [5] Cao N., Wang C., Li M., Et al., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on Parallel & Distributed Systems, 25, 1, pp. 222-233, (2013)
- [6] Li M., Yu S., Lou W., Et al., Toward privacy-assured cloud data services with flexible search functionalities, International Conference on Distributed Computing Systems Workshops, pp. 466-470, (2012)
- [7] Sun W., Yu S., Lou W., Et al., Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems, 27, 4, pp. 1187-1198, (2014)
- [8] Curtmola R., Garay J., Kamara S., Et al., Searchable symmetric encryption: improved definitions and efficient constructions, Journal of Computer Security, 19, 5, pp. 895-934, (2011)
- [9] Gentry C., Fully homomorphic encryption using ideal lattices, Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 169-178, (2009)
- [10] Paillier P., Public-key cryptosystems based on composite degree residuosity classes, International Conference on Theory and Application of Cryptographic Techniques, pp. 223-238, (1999)