共 23 条
- [1] Feng Dengguo, Zhang Min, Zhang Yan, Et al., Research on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
- [2] Qin Zhiguang, Xu Jun, Nie Xuyun, Et al., Overview of public key searchable encryption system, Journal of Cyber Security, 2, 3, pp. 1-12, (2017)
- [3] Ma Mimi, He Debiao, Khan M K, Et al., Certificateless searchable public key encryption scheme for mobile healthcare system, Computers and Electrical Engineering, 65, pp. 413-424, (2018)
- [4] Huang Qiong, Li Hongbo, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Information Sciences, 403, 404, pp. 1-14, (2017)
- [5] Sahai A, Waters B., Fuzzy identity-based encryption, LNCS 3494: Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
- [6] Goyal V, Pandey O, Sahai A, Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
- [7] Li Hongwei, Liu Dongxiao, Dai Yuanshun, Et al., Engineering searchable encryption of mobile cloud networks: When QoE meets QoP, IEEE Wireless Communications, 22, 4, pp. 74-80, (2015)
- [8] Li Shuang, Xu Maozhi, Searchable encryption scheme based on attributes, Chinese Journal of Computers, 37, 5, pp. 1017-1024, (2014)
- [9] Guan Zhitao, Yang Tingting, Xu Ruzhi, Et al., Multi-authority access control scheme based on attribute encryption for cloud storage, Journal on Communications, 36, 6, pp. 120-130, (2015)
- [10] Ying Zuobin, Ma Jianfeng, Cui Jiangtao, Semi-policy hidden attribute encryption scheme supporting dynamic policy update, Journal on Communications, 36, 12, pp. 178-189, (2015)