[1] |
Ali M, Khan S U, Vasilakos A V.Security in cloud comput- ing:Opportunities and challenges[J].Information Sciences,2015,305:357-383.
|
[2] |
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]∥Proc of IEEE Symposium on Security & Privacy,2002:44-55.
|
[3] |
Boneh D, Crescenzo G D,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proc of EUROCRYPT 2004,2004:506-522.
|
[4] |
Qin Zhi-guang,Xu Jun, Nie Xu-yun,et al.A survey of public-key encryption with keyword search[J].Journal of Cyber Security,2017,2(3):1-12.(in Chinese)
|
[5] |
Huang Q,Li H B.An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J].Information Sciences,2017,403/404:1-14.
|
[6] |
Guo Li-feng,Li Zhi-hao,Hu Lei.Efficient public encryption scheme with keyword search for cloud storge[J].Journal of Computer Research and Development,2020,57(7):1404-1414.(in Chinese)
|
[7] |
Xu Guang-wei,Shi Chun-hong,Wang Wen-tao,et al.Multi-keyword searchable encryption algorithm based on semantic extension[J].Journal of Computer Research and Development,2019,56(10):2193-2206.(in Chinese)
|
[8] |
Golle P,Staddon J,Waters B R.Secure conjunctive keyword search over encrypted data[C]∥Proc of the 2nd International Conference on Applied Cryptography & Network Security,2004:31-45.
|
[9] |
Wu C X, Zhang P, Liu H W,et al.An efficient multi- keyword searchable encryption supporting multi-user access control[C]∥Proc of International Conference on Algorithms and Architectures for Parallel Processing,2018:389-398.
|
[10] |
Sahai A, Waters B. Fuzzy identity-based encryption[C]∥Proc of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques,2004:457-473.
|
[11] |
Wang G J,Liu Q,Wu J.Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[C]∥Proc of the 17th ACM Conference on Computer and Communications Security,2010:735-737.
|
[12] |
Zhang Y H,Zheng D,Deng R H.Security and privacy in smart health:Efficient policy-hiding attribute-based access control[J].IEEE Internet of Things Journal,2018,5(3):2130-2145.
|
[13] |
Naruse T,Mohri M,Shiraishi Y.Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J].Human-centric Computing and Information Sciences,2015,5(1):1-13.
|
[14] |
Hur J. Improving security and efficiency in attribute-based data sharing[J].IEEE Transactions on Knowledge & Data Engineering,2013,25(10):2271-2282.
|
[15] |
Yang Y, Ma M D. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-health clouds[J].IEEE Transactions on Information Forensics & Security,2017,11(4):746-759.
|
[16] |
Wang S P,Gao T T,Zhang Y L,et al.Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage[J].Public Library of Science One,2018,13(11):1-19.
|
[17] |
Fan Y Q,Liu Z H.Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting[C]∥Proc of the 2nd IEEE International Conference on Data Science in Cyberspace,2017:441-449.
|
[18] |
Liu X Y,Lu T T,He X M,et al.Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication[J].IEEE Access,2020,8:52062-52074.
|
[19] |
Sun J, Ren L L,Wang S P,et al.Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage[J].IEEE Access,2019,7:66655-66667.
|
|
附中文参考文献:
|
[4] |
秦志光,徐骏,聂旭云,等.公钥可搜索加密体制综述[J].信息安全学报,2017,2(3):1-12.
|
[6] |
郭丽峰,李智豪,胡磊.面向云存储的带关键词搜索的公钥加密方案[J].计算机研究与发展,2020,57(7):1404-1414.
|
[7] |
徐光伟,史春红,王文涛,等.基于语义扩展的多关键词可搜索加密算法[J].计算机研究与发展,2019,56(10):2193-2206.
|