[1] BAEK J, SAFAVI-NAINI R, SUSILO W. Public key encryption with keyword search revisited[C]// 2008 International Conference on Computational Science and Its Applications. 2008:1249-1259.
[2] HWANG Y,LEE P. Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]// 2007 International Conference on Pairing-based Cryptography. 2007:2-22.
[3] CHEN R M, MU Y, YANG G M, et al. Server-aided public key encryption with keyword search[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12):2833-2842.
[4] SONG D, WANGER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of 2000 IEEE Computer Society Symposium on Research in Security and Privacy. 2000:44-55.
[5] CHANG Y, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005:442-455.
[6] CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934.
[7] BONEH D, CRESCENZO G D, OSTROVSKY R,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004:506-522.
[8] WATERS B, BALFANZ D, DURFEE G, et al. Building an encrypted and searchable audit log[C]// The 11th Network and Distributed System Security. 2004.
[9] LI J, WANG Q, WANG C, et al. Fuzzy keyword search over encrypted data in cloud computing[J]. International Journal of Engineering Research and Applications, 2014,4(7):441-445.
[10]LIU C, ZHU L H, LI L Y, et al. Fuzzy keyword search on encrypted cloud storage data with small index[C]// 2011 International Conference on Cloud Computing and Intelligence Systems. 2011:269-273.
[11]WANG C, REN K, YU S C, et al. Achieving usable and privacy-assured similarity search over outsourced cloud data[C]// Proceedings of the 3lth IEEE International Conference on Computer Communications. 2012:451-459.
[12]CHUAH M, HU W. Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]// 2011 31st International Conference on Distributed Computing Systems. 2011:273-281.
[13]ZHOU W, LIU L X, JING H, et al. K-gram based fuzzy keyword search over encrypted cloud computing[J]. Journal of Software Engineering and Applications, 2013(6):29-32.
[14]WANG J F, MA H, TANG Q, et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing[J]. Computer Science and Information System, 2010(2):667-684.
[15]WANG Y L, BAO W Y, ZHAO Y, et al. An ElGamal encryption with fuzzy keyword search on cloud environment[J]. International Journal of Network Security, 2016,18(3):481-486.
[16]ZHU H, MEI Z L, WUB, et al. Fuzzy keyword search and access control over ciphertexts in cloud computing[C]// Australasian Conference on Information Security and Privacy. 2017:248-265.
[17]RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010,83(5):763-771.
[18]LIU Q, WANG G J, WU J. An efficient privacy preserving keyword search scheme in cloud computing[C]// International Conference on Computational Science and Engineering. 2009:715-720.
[19]孙婷,王建东. 基于模糊关键字搜索的无安全信道公钥加密[J]. 计算机应用与软件, 2014(3):309-318.
[20]TANG Q, CHEN L. Public key encryption with registered keyword search[C]// The 6th European Workshop on Public Key Services, Applications and Infrastructures. 2010:163-178.
[21]ZHANG B, ZHANG F G. An efficient public key encryption with conjunctive-subset keywords search[J]. Journal of Network and Computer Applications, 2011,34(1):262-267.
[22]LV Z Q, HONG C, ZHANG M, et al. Expressive and secure searchable encryption in the public key setting[C]// 2014 International Conference on Information Security. 2014:364-376. |