[1] |
Bai Li-fang,Zhu Yue-fei,Lu Bin.Research and development of data storage security audit in cloud[J].Computer Science,2020,47(10):290-300.(in Chinese)
|
[2] |
Han Pei-yi,Liu Chuan-yi,Wang Jia-hui,et al.Research on data encryption system and technology for cloud storage[J].Journal on Communications,2020,41(8):55-65.(in Chinese)
|
[3] |
Boneh D,Di C,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proc of International Conference on the Theory and Applications of Cryptographic Techniques,2004:506-522.
|
[4] |
Lin Q, Yan H Y,Huang Z G,et al.An ID-based linearly homomorphic signature scheme and its application in block chain[J].IEEE Access,2018,6:20632-20640.
|
[5] |
Peng Y G,Cui J T,Peng C G,et al.Certificateless public key encryption with keyword search[J].China Communications,2014,11(11):100-113.
|
[6] |
Yang G M,Tan C,Huang Q,et al.Probabilistic public key encryption with equality test[C]∥Proc of Cryptographers’ Track at the RSA Conference,2010:119-131.
|
[7] |
Tang Q.Towards public key encryption scheme supporting equality test with fine-grained authorization[C]∥Proc of Australasian Conference on Information Security and Privacy,2011:389-406.
|
[8] |
Tang Q.Public key encryption supporting plaintext equality test and user specified authorization[J].Security and Communication Networks,2012,5:1351-1362.
|
[9] |
Tang Q.Public key encryption schemes supporting equality test with authorisation of different granularity[J].International Journal of Applied Cryptography,2012,2(4):304-321.
|
[10] |
Ma S,Zhang M,Huang Q,et al.Public key encryption with delegated equality test in a multi-user setting[J].The Computer Journal,2015,58(4):986-1002.
|
[11] |
Huang K,Tso R,Chen Y,et al.PKE-AET:Public key encryption with authorized equality test[J].The Computer Journal,2015,58(10):2686-2697.
|
[12] |
Ma S. Identity-based encryption with outsourced equality test in cloud computing[J].Information Sciences,2016,328:389-402.
|
[13] |
Wu Li-bing, Zhang Yu-bo,He De-biao.Dual server identity-based encryption with equality test for cloud computing[J].Journal of Computer Research and Development,2017,54(10):2232-2243.(in Chinese)
|
[14] |
Lu Y, Li J G. Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems[J].Cluster Computing,2019,22:285-299.
|
[15] |
Zhang Qi,Lin Xi-jun,Qu Hai-peng.Identity-based encryption scheme support authorization equality test in cloud environment[J].Netinfo Security,2018,18(6):52-60.(in Chinese)
|
[16] |
Ramadan M,Liao Y,Li F,et al.IBEET-RSA:Identity-based encryption with equality test over RSA for wireless body area networks[J].Mobile Networks and Applications,2020,25(1):223-233.
|
[17] |
The pairing-based cryptography library [EB/OL].[2015-12-11].http:∥crypto.stanford.edu/pbc/.
|
|
附中文参考文献:
|
[1] |
白利芳,祝跃飞,芦斌.云数据存储安全审计研究及进展[J].计算机科学,2020,47(10):290-300.
|
[2] |
韩培义,刘川意,王佳慧,等.面向云存储的数据加密系统与技术研究[J].通信学报,2020,41(8):55-65.
|
[13] |
吴黎兵,张宇波,何德彪.云计算中基于身份的双服务器密文等值判定协议[J].计算机研究与发展,2017,54(10):2232-2243.
|
[15] |
张琦,林喜军,曲海鹏.云计算中支持授权相等测试的基于身份加密方案[J].信息网络安全,2018,18(6):52-60.
|