共 30 条
- [1] Song DX, Wagner D, Perrig A., Practical techniques for searches on encrypted data, Proc. of the 2000 IEEE Symp. on Security and Privacy, pp. 44-55, (2000)
- [2] Kamara S, Papamanthou C, Roeder T., Dynamic searchable symmetric encryption, Proc. of the 2012 ACM Conf. on Computer and Communications Security, pp. 965-976, (2012)
- [3] Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G., Public key encryption with keyword search, Proc. of the 2004 Int’l Conf. on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
- [4] Tahir S, Ruj S, Rahulamathavan Y, Rajarajan M, Glackin C., A new secure and lightweight searchable encryption scheme over encrypted cloud data, IEEE Trans. on Emerging Topics in Computing, 7, 4, pp. 530-544, (2019)
- [5] Li HW, Yang Y, Dai YS, Yu S, Xiang Y., Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data, IEEE Trans. on Cloud Computing, 8, 2, pp. 484-494, (2020)
- [6] Sun SF, Zuo C, Liu JK, Sakzad A, Steinfeld R, Yuen TH, Yuan XL, Gu DW., Non-interactive multi-client searchable encryption: Realization and implementation, IEEE Trans. on Dependable and Secure Computing, 19, 1, pp. 452-467, (2022)
- [7] Zhang MW, Chen Y, Huang JJ., SE-PPFM: A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems, IEEE Systems Journal, 15, 2, pp. 2980-2988, (2021)
- [8] Goh EJ., Secure indexes, (2003)
- [9] Curtmola R, Garay J, Kamara S, Ostrovsky R., Searchable symmetric encryption: Improved definitions and efficient constructions, Proc. of the 13th ACM Conf. on Computer and Communications Security, pp. 79-88, (2006)
- [10] Cash D, Grubbs P, Perry J, Ristenpart T., Leakage-abuse attacks against searchable encryption, Proc. of the 22nd ACM SIGSAC Conf. on Computer and Communications Security, pp. 668-679, (2015)