共 24 条
- [1] SONG D X, WAGNER D, PERRIG A., Practical Techniques for Searches on Encrypted Data, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44-55, (2000)
- [2] GOH E J., Secure Indexes[J], IACR Cryptology ePrint Archive, 2003, (2003)
- [3] CURTMOLA R, GARAY J, KAMARA S, Et al., Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, The 13th ACM Conference on Computer and Communications Security, pp. 79-88, (2006)
- [4] CHANG Y C, MITZENMACHER M., Privacy Preserving Keyword Searches on Remote Encrypted Data [C], International Conference on Applied Cryptography and Network Security, pp. 442-455, (2005)
- [5] FU Z, WU X, GUAN C, Et al., Toward Efficient Multi-Keyword Fuzzy Search over Encrypted Outsourced Data with Accuracy Improvement, IEEE Transactions on Information Forensics and Security, 11, 12, pp. 2706-2716, (2016)
- [6] CONG W, REN K, YU S, Et al., Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data [C], IEEE INFOCOM, pp. 451-459, (2012)
- [7] BALLARD L, KAMARA S, MONROSE F., Achieving Efficient Conjunctive Keyword Searches over Encrypted Data, International Conference on Information and Communications Security, pp. 414-426, (2005)
- [8] YAN Xixi, ZHAO Qiang, TANG Yongli, Et al., Multi-Keyword Search Encryption Scheme Supporting Flexible Access Control, Journal of Xidian University, 49, 1, pp. 55-66, (2022)
- [9] GOLLE P, STADDON J, WATERS B., Secure Conjunctive Keyword Search over Encrypted Data [C], International Conference on Applied Cryptography and Network Security, pp. 31-45, (2004)
- [10] CASH D, GRUBBS P, PERRYE J, Et al., Leakage-Abuse Attacks Against Searchable Encryption, The 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668-679, (2015)