共 32 条
[1]
SONG D X, WAGNER D, PERRIG A., Practical techniques for searches on encrypted data, Proceedings of the IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
[2]
BONEH D, CRESCENZO G D, OSTROVSKY R, Et al., Public key encryption with keyword search, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
[3]
RHEE H S, SUSILO W, KIM H J., Secure searchable public key encryption scheme against keyword guessing attacks, IEICE Electronics Express, 6, 5, pp. 237-243, (2009)
[4]
GOLLE P, STADDON J, WATERS B., Secure conjunctive keyword search over encrypted data, Applied Cryptography and Network Security: Second International Conference, pp. 31-45, (2004)
[5]
LI H W, YANG Y, LUAN T H, Et al., Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, IEEE Transactions on Dependable and Secure Computing, 13, 3, pp. 312-325, (2016)
[6]
SAHAI A, WATERS B., Fuzzy identity-based encryption, Advances in Cryptology-EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
[7]
WATERS B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, International Workshop on Public Key Cryptography, pp. 53-70, (2011)
[8]
GAO S Y, CHEN Y L, XU Y L., Expressive attribute-based searchable encryption scheme in cloud computing, Computer Science, 49, 3, pp. 313-321, (2022)
[9]
SRAVANTHI K, CHANDRASEKHAR P., An efficient multi-user group-wise integrity CP-ABE(GI-CPABE) for homogeneous and heterogeneous cloud blockchain transactions, Journal of Electrical Systems, 20, 1, pp. 326-349, (2024)
[10]
LI J G, ZHANG R Y, LU Y, Et al., Multiauthority attribute-based encryption for assuring data deletion, IEEE Systems Journal, 17, 2, pp. 2029-2038, (2023)