共 14 条
- [1] Wang Q, He M, Du M, Et al., Searchable encryption over feature-rich data, IEEE Transactions on Dependable & Secure Computing, 12, 3, pp. 496-510, (2018)
- [2] Yu Y, Au M H A, Ateniese G, Et al., Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, IEEE Transactions on Information Forensics & Security, 12, 4, pp. 767-778, (2017)
- [3] Song D X, Wagner D, Perrig A., Practical techniques for searches on encrypted data, IEEE Symposium on Security & Privacy, pp. 44-55, (2000)
- [4] Goh E J., Secure indexes
- [5] Chang Y C, Mitzenmacher M., Privacy preserving keyword searches on remote encrypted data, Applied Cryptography and Network Security, pp. 442-455, (2005)
- [6] Stefanov E, Papamanthou C, Shi E., Practical dynamic searchable encryption with small leakage, Network and Distributed System Security Symposium, pp. 1-15, (2014)
- [7] Kamara S, Moataz T., Boolean searchable symmetric encryption with worst-case sub-linear complexity [C], Advances in Cryptology-EUROCRYPT 2017, pp. 99-124, (2017)
- [8] Boneh D, Crescenzo G D, Ostrovsky R, Et al., Public key encryption with keyword search, Lecture Notes in Computer Science, 49, 16, pp. 506-522, (2003)
- [9] Bellare M, Boldyreva A, O'Neill A., Deterministic and efficiently searchable encryption, Advances in Cryptology-CRYPTO 2007, pp. 535-552, (2007)
- [10] Lin X, Lu R, Foxton K, Et al., An efficient searchable encryption scheme and its application in network forensics, Forensics in Telecommunications, Information and Multimedia, pp. 66-78, (2011)