[1] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of 2000 IEEE Symposium on Security and Privacy. 2000:44-55.
[2] BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of 2004 International Conference on the Theory and Applications of Cryptographic Techniques. 2004:73-86.
[3] BYUN J, RHEE H, PARK H, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]// Proceedings of the Workshop on Secure Data Management. 2006:75-83.
[4] BAEK J, SAFAVI-NAINI R, SUSILO W. Public key encryption with keyword search revisited[C]// Proceedings of Computational Science and Its Applications. 2008:1249-1259.
[5] YAU W, HENG S, GOI B. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[C]// Proceedings of Autonomic and Trusted Computing. 2008:100-105.
[6] RHEE H, PARK J, SUSILO W, el al. Improved searchable public key encryption with designated tester [C]// Proceedings of International Symposium on ACM Symposium on Information, Computer and Communications Security. 2009:376-379.
[7] RHEE H, PARK J, SUSILO W, el al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of System and Software, 2008,83(5):763-771.
[8] SHAO Z, YANG B. On security against the server in designated tester public key encryption with keyword search[J]. Journal of Information Processing Letters, 2015,115(12):957-961.
[9] HU C, LIU P. An enhanced searchable public key encryption scheme with a designated tester and its extensions[J]. Journal of Computers, 2012,7(3):716-723.
[10]HU C, LIU P. A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension[C]// Proceedings of Computer Science, Environment, Ecoinformatics and Education. 2011:131-136.
[11]GU C, ZHU Y, PAN H. Efficient public key encryption with keyword search schemes from pairings[C]// Proceedings of Information Security and Cryptology. 2007:372-383.
[12]FANY L, SUSILO W, GE C, et al. Public key encryption with keyword search secure against keyword guessing attacks without random Oracle[J]. Journal of Information Sciences, 2013,238(7):221-241.
[13]VALLENT T, KIM H. A pairing-free public key encryption with keyword searching for cloud storage services[C]// Proceedings of E-Infrastructure and E-Services for Developing Countries. 2013:70-78.
[14]HU C, HE P, LIU P. Public key encryption with multi-keyword search[C]// Proceedings of Network Computing and Information Security. 2012:568-576.
[15]WU T, TSAI T, TSENG Y. Efficient searchable ID-based encryption with a designated server[J]. Journal of Annals of Telecommunications, 2013,69(7):391-402.
[16]ZHANG J H, MAO J. Efficient public key encryption with revocable keyword search in cloud computing[J]. Journal of Cluster Computing, 2016,19(3):1211-1217.
[17]王刚,李非非,王瑶. 指定服务器的基于身份加密连接关键字搜索方案[J]. 计算机与现代化, 2017(4):118-121.
[18]BAEK J, SAFAVI-NAINI R, SUSILO W. On the integration of public key data encryption and public key encryption with keyword search[C]// Proceedings of International Conference on Information Security. 2006:217-232.
[19]ZHANG R, IMAI H. Generic combination of public key encryption with keyword search and public key encryption[C]// Proceedings of Cryptology and Network Security. 2007:159-174.
[20]CHEN Y, ZHANG J, LIN D. Generic constructions of integrated PKE and PEKS[J]. Journal of Designs Codes and Cryptography, 2014,78(2):493-526.
[21]BUCCAFURRI F, LAX G, SAHU R, et al. Practical and secure integrated PKE+PEKS with keyword privacy[C]// Proceedings of International Joint Conference on E-Business and Telecommunications. 2016:448-453.
[22]CHEN Y. SPEKS: Secure server-designation public key encryption with keyword search against keyword guessing attacks[J]. Journal of Computer Journal, 2014,58(4):922-933.
[23]ABDALLA M, BELLARE M, ROGAWAY P. The Oracle Diffie-Hellman assumptions and an analysis of DHIES[C]// Proceedings of Topics in Cryptology. 2001:143-158. |