[1] Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. 2000:44-55.
[2] Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data[C]// Proceedings of the 2nd International Conference on Applied Cryptography and Network Security. 2004:31-45.
[3] Boneh D, Crescenzo G D, Ostrovsky R, et al. Public key encryption with keyword search[C]// Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques. 2004:506-522.
[4] Park D, Kim K, Lee P J. Public key encryption with conjunctive filed keyword search[C]// Proceedings of the 5th International Conference on the Information Security Applications. 2004:73-86.
[5] Byun J W, Lee D H, Lim J. Efficient conjunctive keyword search on encrypted data storage system[C]// Proceedings of the 3rd European Conference on Public Key Infrastructure: Theory and Practice. 2006:184-196.
[6] Hwang Y H, Lee P J. Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]// Proceedings of the 1st International Conference on Pairing-Based Cryptography. 2007:2-22.
[7] Lv Zhiquan, Hong Cheng, Zhang Min, et al. Expressive and secure searchable encryption in the public key setting[C]// Proceedings of the 17th International Conference on Information Security. 2014:364-376.
[8] Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited[C]// Proceedings of the 2008 International Conference on Computational Science and Its Applications. 2008:1249-1259.
[9] Fang Liming, Susilo W, Ge Chunpeng, et al. A secure channel free public key encryption with keyword search scheme without random oracle[C]// Proceedings of the 8th International Conference on Cryptology and Network Security. 2009:248-258.〖HJ1.25mm〗
[10]Rhee H S, Park J H, Susilo W, et al. Improved searchable public key encryption with designated tester[C]// Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. 2009:376-379.
[11]Byun J W, Rhee H, Park H, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]// Proceedings of the 3rd VLDB Workshop on Secure Data Management. 2006:75-83.
[12]Yau W C, Heng S H, Goi B M. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[C]// Proceedings of the 5th International Conference on Autonomic and Trusted Computing. 2008:100-105.
[13]Rhee H S, Park J H, Susilo W, et al. Trapdoor security in a searchable public key encryption scheme with a designated tester[J]. Journal of System and Software, 2010,83(5):763-771.
[14]Hu Chengyu, Liu Pengtao. An enhanced searchable public key encryption scheme with a designated server and its extensions[J]. Journal of Computers, 2012,7(3):716-723.
[15]Shamir A. Identity-based cryptosystems and signature schemes[C]// Proceedings of CRYPTO’84 on Advances in Cryptology. 1984:47-53.
[16]Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]// Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. 2001:213-229.
[17]Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions[J]. Journal of Cryptology, 2008,21(3):350-391.
[18]〖JP2〗Tian Xiuxia, Wang Yong. ID-based encryption with keyword search scheme from bilinear pairings[C]// Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. 2008:1-4.
[19]Tomida K, Mohri M, Shiraishi Y. Keyword searchable encryption with access control from a certain identity-based encryption[C]// Proceedings of the 2013 International Conference on Future Information Technology. 2013:113-118.
[20]Tomida K, Doi H, Mohri M, et al. Ciphertext divided anonymous HIBE and its transformation to identity-based encryption with keyword search[J]. Journal of Information Processing, 2015,23(5):562-569.
[21]Liu Jia’nan, Lai Junzuo, Huang Xinyi. Dual trapdoor identity-based encryption with keyword search[J]. Soft Computing, 2015, doi:10.1007/s00500-015-1960-6.
[22]Wu Tsu-Yang, Tsai Tung-Tso, Tseng Yuh-Min. Efficient searchable ID-based encryption with a designated server[J]. Annals of Telecommunications, 2014,69(7-8):391-402.
[23]王少辉,韩志杰,肖甫,等. 指定测试者的基于身份可搜索加密方案[J]. 通信学报, 2014,35(7):22-33. |