[1]BONEH D, Di CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Advances in Cryptology-Eurocrypt 2004, LNCS 5072. Berlin: Springer, 2004: 506-522.
[2]ABDALLA M, BELLARE M, CATALANO D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions[C]// Advances in Cryptology-CRYPTO 2005, LNCS 3621. Berlin: Springer, 2005: 205-222.
[3]EMURA K, MIYAJI A, OMOTE K. Adaptive secure-channel free public-key encryption with keyword search implies timed release encryption[C]// Proceedings of the 14th International Conference on Information, LNCS 7001. Berlin: Springer, 2011: 102-118.
[4]SIAD A. Anonymous identity-based encryption with distributed private-key generator and searchable encryption[C]// Proceedings of the 2012 5th International Conference on New Technologies, Mobility and Security. Piscataway: IEEE, 2012: 1-8.
[5]ABDALLA M, BOYEN X, CHEVALIER C, et al. Distributed public-key cryptography from weak secrets[C]// Public Key Cryptography-PKC 2009, LNCS 5543. Berlin: Springer, 2009: 139-159.
[6]CAMENISCH J, KOHLWEISS M, RIAL A, et al. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data[C]// Public Key Cryptography-PKC 2009, LNCS 5443. Berlin: Springer, 2009: 196-214.
[7]FUHR T, PAILLIER P. Decryptable searchable encryption[C]// Proceedings of the 1st International Conference on Provable Security. Berlin: Springer, 2007: 228-236.
[8]FANG L M, WANG J D, GE C P, et al. Decryptable public key encryption with keyword search schemes[J]. International Journal of Digital Content Technology and its Applications, 2010, 4(9): 141-150.
[9]HU C, LIU P. An enhanced searchable public key encryption scheme with a designated tester and its extensions[J]. Journal of Computers, 2012, 7(3): 716-723.
[10]SHAO J, CAO Z, LIANG X, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576-2587.
[11]YAU W C, PHAN R C W, HENG S H, et al. Proxy re-encryption with keyword search: new definitions and algorithms[C]// Security Technology, Disaster Recovery and Business Continuity, CCIS 122. Berlin: Springer, 2010: 149-160.
[12]FANG L, SUSILO W, GE C, et al. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search[J]. Theoretical Computer Science, 2012,462: 39-58.
[13]WANG X A, HUANG X, YANG X, et al. Further observation on proxy re-encryption with keyword search[J]. Journal of Systems and Software, 2012, 85(3): 643-654.
[14]IBRAIMI L, NIKOVA S, HARTEL P, et al. Public-key encryption with delegated search[C]// Proceedings of the 9th International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2011: 532-549.
[15]TANG Q, CHEN L. Public-key encryption with registered keyword search[C]// Proceedings of the 6th European Conference on Public Key Infrastructures, Services and Applications, LNCS 6391. Berlin: Springer, 2010: 163-178.
[16]KHADER D. Public key encryption with keyword search based on K-resilient IBE[C]// Proceedings of the 2007 International Conference on Computational Science and its Applications. Berlin: Springer, 2006: 298-308.
[17]BYUN J W, RHEE H S, PARK H A, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]// Secure Data Management, LNCS 4165. Berlin: Springer, 2006: 75-83.
[18]JEONG I R, KWON J O, HONG D, et al. Constructing PEKS schemes secure against keyword guessing attacks is possible?[J]. Computer Communications, 2009, 32(2): 394-396.
[19]YAU W C, HENG S H, GOI B M. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[C]// Proceedings of the 5th International Conference on Autonomic and Trusted Computing,LNCS 5060. Berlin: Springer, 2008: 100-105.
[20]RHEE H S, SUSILO W, KIM H J. Secure searchable public key encryption scheme against keyword guessing attacks[J]. IEICE Electronics Express, 2009, 6(5): 237-243.
[21]RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763-771.
[22]CHEN Y C, HORNG G. Time-stamped conjunctive keyword-searchable public key encryption[C]// Proceedings of the 4th International Conference on Innovative Computing, Information and Control. Piscataway: IEEE, 2009: 729-732.
[23]YANG H M, XU C X, ZHAO H T. An efficient public key encryption with keyword scheme not using pairing[C]// Proceedings of the 1st International Conference on Instrumentation, Measurement, Computer, Communication and Control. Piscataway: IEEE, 2011: 900-904.
[24]ZHU B, ZHU B, REN K. PEKSRAND. Providing predicate privacy in public-key encryption with keyword search[C]// Proceedings of the 2011 IEEE International Conference on Communications. Piscataway: IEEE, 2011: 1-6.
[25]DUNTAO G, DAWEI H, HAIBIN C, et al. A new public key encryption with temporary keyword search[C]// Proceedings of the 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering. Piscataway: IEEE, 2010: 80-83.
[26]YANG H M, JIN E W, LIU C Z, et al. A SCF-PEKS scheme without random oracle under simple assumption[C]// Proceedings of the 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control. Piscataway: IEEE, 2011: 905-908.
[27]FANG L, SUSILO W, GE C, et al. A secure channel free public key encryption with keyword search scheme without random oracle[C]// Proceedings of the 8th International Conference on Cryptology and Network Security, LNCS 5888. Berlin: Springer, 2009: 248-258.
[28]REN Y, WANG S, ZHANG X, et al. Fully secure anonymous identity-based encryption under simple assumptions[C]// Proceedings of the 2010 International Conference on Multimedia Information Networking and Security. Piscataway: IEEE, 2010: 428-432.
[29]CHEN Z, WU C, WANG D, et al. Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor[C]// Proceedings of the 2012 Pacific Asia Conference on Intelligence and Security Informatics, LNCS 7299. Berlin: Springer, 2012: 176-189.
[30]BAEK J, SAFAVI-NAINI R, SUSILO W. Public key encryption with keyword search revisited[C]// Proceedings of the 2008 International Conference on Computational Science and its Applications, LNCS 5072. Berlin: Springer, 2008: 1249-1259.
[31]RHEE H S, PARK J H, LEE D H. Generic construction of designated tester public-key encryption with keyword search[J]. Information Sciences, 2012, 205: 93-109.
[32]RYU E K, TAKAGI T. Efficient conjunctive keyword-searchable encryption[C]// Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops. Piscataway: IEEE, 2007: 409-414.
[33]BONEH D, WATERS B. Conjunctive, subset, and range queries on encrypted data[C]// Proceedings of the 4th Conference on Theory of Cryptography, LNCS 4575. Berlin: Springer, 2007: 535-554.
[34]HATTORI M, HIRANO T, ITO T, et al. Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting[C]// Proceedings of the 13th IMA International Conference on Cryptography and Coding. Berlin: Springer, 2011: 190-209.
[35]HUANG D, YANG X, CHEN H. New public key encryption with multiple keyword search[J]. Application Research of Computers, 2010, 27(7): 2629-2630, 2635. (黄大威, 杨晓元, 陈海滨. 一类新的多关键词检索的公钥加密方案[J]. 计算机应用研究, 2010, 27(7): 2629-2630, 2635.)
[36]LI J, WANG Q, WANG C, et al. Fuzzy keyword search over encrypted data in cloud computing[C]// Proceedings of the 29th Conference on Information Communications. Piscataway: IEEE, 2010: 441-445.
[37]BRINGER J, CHABANNE H. Embedding edit distance to allow private keyword search in cloud computing[C]// Secure and Trust Computing, Data Management and Applications, CCIS 186. Berlin: Springer, 2011: 105-113.
[38]LIU C, ZHU L, LI L, et al. Fuzzy keyword search on encrypted cloud storage data with small index[C]// Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems. Piscataway: IEEE, 2011: 269-273.
[39]CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed System, 2014, 25(1): 222-233. |