[1] |
Feng Deng-guo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,22 (1):71-83.(in Chinese)
|
[2] |
Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]∥Proc of 2000 IEEE Symposium on Security and Privacy,2000:44-55.
|
[3] |
Boneh D, DI Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proc of International Conference on the Theory and Applications of Cryptographic Techniques,2004:506-522.
|
[4] |
Boneh D, Boyen X. Efficient selective identity-based encryption without random oracles[J].Journal of Cryptology,2011,24(4):659-693.
|
[5] |
Shamir A. Identity-based cryptosystems and signature schemes[C]∥Proc of Workshop on the Theory and Application of Cryptographic Techniques,
|
19 |
85:47-53.
|
[6] |
Whitfield D,Martin H.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
|
[7] |
Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proc of International Conference on the Theory and Application of Cryptology and Information Security,2003:452-473.
|
[8] |
Baek J,Safavi-Naini R,Susilo W.Certificateless public key encryption without pairing[C]∥Proc of the 8th International Conference on Information Security,
|
20 |
05:134-148.
|
[9] |
Ma Mi-mi, He De-biao,Khan M K,et al.Certificateless searchable public key encryption scheme for mobile healthcare system[J].Computers & Electrical Engineering,2018,65:413-424.
|
[10] |
Wu T Y,Meng C,Chen C M,et al.On the security of a certificateless public key encryption with keyword search[C]∥Proc of International Conference on Intelligent Information Hiding & Multimedia Signal Processing,2017:191-197.
|
[11] |
Peng Yan-guo, Cui Jiang-tao, Peng Chang-gen, et al.Certificateless public key encryption with keyword search[J].China Communications,2014,11(11):100-113.
|
[12] |
He De-biao,Ma Mi-mi,Zeadall S,et al.Certificateless public key authenticated encryption with keyword search for industrial Internet of Things[J].IEEE Transactions on Industrial Informatics,2018,14(8):3618-3627.
|
[13] |
Ma Mi-mi, He De-biao, Kumar N,et al.Certificateless searchable public key encryption scheme for industrial Internet of Things[J].IEEE Transactions on Industrial Informatics,2018,14(2):759-767.
|
[14] |
Luan I,Nikova S,Hartel P,et al.Public key encryption with delegated search[C]∥Proc of International Conference on Applied Cryptography and Network Security,2011:532-549.
|
[15] |
Tang Qiang,Ma Hua,Chen Xiao-feng.Extend the concept of public key encryption with delegated search[J].The Computer Journal,2015,58(4):724-734.
|
[16] |
Qu Hai-peng, Zhen Yan, Lin Xi-jun,et al.Certificateless public key encryption with equality test[J].Information Sciences,2018,462:76-92.
|
[17] |
Cao Su-zhen,Lang Xiao-li,Liu Xiang-zhen,et al.Delegate searchable encryption scheme resisting keyword guess[J].Journal of Electronics & Information Technology,2019,41(9):2180-2186.(in Chinese)
|
|
附中文参考文献:
|
[1] |
冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
|
[17] |
曹素珍,郎晓丽,刘祥震,等.抗关键词猜测的授权可搜索加密方案[J].电子与信息学报,2019,41(9):2180-2186.
|