[1] GOLDREICH ODED,OSTROVSKY RAFAIL.Software Protection and Simulation on Oblivious RAMs[J].Journal of the ACM,1996,43(3):431-473.
[2] POH GEONG SEN,CHIN JI-JIAN,YAU WEI-CHIN,et al.Searchable Symmetric Encryption:Designs and Challenges[J].ACM Computing Surveys (CSUR),2017,50(3):1-37.
[3] CHOW RICHARD,GOLLE PHILIPPE,JAKOBSSON MARKUS,et al.Controlling Data in the Cloud:Outsourcing Computation Without Outsourcing Control[C]∥Proceedings of the 2009 ACM Workshop on Cloud Computing Security.New York,NY:ACM,2009:85-90.
[4] GENTRY CRAIG.Fully Homomorphic Encryption Using Ideal Lattices[C]∥Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing.New York,NY:ACM,2009:169-178.
[5] SONG DAWN XIAODING,WAGNER DAVID,PERRIG ADRIAN.Practical Techniques for Searches on Encrypted Data[C]∥Proceeding 2000 IEEE Symposium on Security and Privacy.S&P 2000.Piscataway,NJ:IEEE,2000:44-55.
[6] GOH EU-JIN.Secure Indexes[EB/OL].(2004-03-16)[2022-03-10].http:∥eprint.iacr.org/2003/216.
[7] CURTMOLA REZA,GARAY JUAN,KAMARA SENY,et al.Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,NY:ACM,2006:79-88.
[8] WONG WAI KIT,CHEUNG DAVID WAI-LOK,KAO Ben,et al.Secure kNN Computation on Encrypted Databases[C]∥Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data.New York,NY:ACM,2009:139-152.
[9] BONEH DAN,CRESCENZO GIOVANNI DI,OSTROVSKY RAFAIL,et al.Public Key Encryption with Keyword Search[C]∥Advances in Cryptology-EUROCRYPT 2004:International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer,2004:506-522.
[10] GOLLE PHILIPPE,STADDON JESSICA,WATERS BRENT.Secure Conjunctive Keyword Search over Encrypted Data[C]∥Applied Cryptography and Network Security:Second International Conference,ACNS 2004.Berlin,Heidelberg:Springer,2004:31-45.
[11] BALLARD LUCAS,KAMARA SENY,MONROSE FABIAN.Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]∥International Conference on Information and Communications Security.Berlin,German:Springer,2005:414-426.
[12] HWANG YONG HO,LEE PIL JOONG.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System[C]∥International Conference on Pairing-Based Cryptography.Berlin,German:Springer,2007:2-22.
[13] WANG Cong,CAO Ning,LI Jin,et al.Secure Ranked Keyword Search over Encrypted Cloud Data[C]∥2010 IEEE 30th International Conference on Distributed Computing Systems.Piscataway,NJ:IEEE,2010:253-262.
[14] BOLDYREVA ALEXANDRA,CHENETTE NATHAN,LEE YOUNHO,et al.Order-Preserving Symmetric Encryption[C]∥Advances in Cryptology-EUROCRYPT 2009:28th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer,2009:224-241.
[15] CAO Ning,WANG Cong,LI Ming,et al.Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(1):222-233.
[16] LI Jin,WANG Qian,WANG Cong,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]∥2010 Proceedings IEEE INFOCOM.Piscataway,NJ:IEEE,2010:1-5.
[17] LIU Qin,TAN CHIU C,WU Jie,et al.Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments[C]∥2012 Proceedings IEEE INFOCOM.Piscataway,NJ:IEEE,2012:2581-2585.
[18] DIJK MARTEN,GENTRY CRAIG,HALEVI SHAI,et al.Fully Homomorphic Encryption over the Integers[C]∥Advances in Cryptology-EUROCRYPT 2010:29th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer,2010:24-43.
[19] CRAMER RONALD,SHOUP VICTOR.A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack[C]∥Advances in Cryptology-CRYPTO'98:18th Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1998:13-25.
[20] BURTON H.BLOOM.Space/Time Trade-Offs in Hash Coding with Allowable Errors[J].Communications of the ACM,1970,13(7):422-426.
[21] DE CARO ANGELO,IOVINO VINCENZO.The Java Pairing-Based Cryptography Library (JPBC)[EB/OL].(2013-12-04)[2022-03-12].http:∥gas.dia.unisa.it/projects/jpbc/index.html#.VJpmtsTA.
[22] LYNN BEN.PBC (Pairing-Based Cryptography) Library[EB/OL].(2006-09-17)[2022-03-12].http:∥crypto.stanford.edu/pbc/.
|