共 21 条
[1]
Dawn S.D., Song D., Wagner A.P., Et al., Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Security and Privacy Symposium, pp. 44-45, (2000)
[2]
Boneh D., Crescenzo G.D., Ostrovsky R., Et al., Public key encryption with keyword search, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
[3]
Curtmola R., Garay J., Kamara S., Et al., Searchable symmetric encryption: improved definitions and efficient constructions, Journal of Computer Security, 19, 5, pp. 895-934, (2011)
[4]
Wang P., Wang H., Pieprzyk J., Threshold privacy preserving keyword searches, Conference on Sofsem: Theory & Practice of Computer Science, pp. 646-658, (2008)
[5]
Yuan K., Liu Z.L., Jia C.F., Et al., Public key timed-release searchable encryption in one-to-many scenarios, Tien Tzu Hsueh Pao/Acta Electronica Sinica, 43, 4, pp. 760-768, (2015)
[6]
Zhong H., Cui J., Shi R.H., Et al., Many-to-one homomorphic e-ncryption scheme, Security & Communication Networks, 9, 10, pp. 1007-1015, (2016)
[7]
Tang Q., Chen L.Q., Public-key encryption with registered keyword search, 6th European Workshop Public Key Infrastructures, pp. 163-178, (2009)
[8]
Fang L.M., Susilo W., Ge C., Et al., Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Information Sciences, 238, pp. 221-241, (2013)
[9]
Xu P., Jin H., Wu Q., Et al., Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack, IEEE Transactions on Computers, 62, 11, pp. 2266-2277, (2013)
[10]
Chen R., Mu Y., Yang G., Et al., A new general framework for secure public key encryption with keyword search, Australasian Conference on Information Security and Privacy, pp. 59-76, (2015)