[1] MEZGHANI K, AYADI F. Factors explaning IS managers attitudes toward cloud computhing adoption[J]. International Journal of Technology and Human Interaction, 2016, 12(1):1-20. [2] CLEAR M, HUGHES A, TEWARI H. Homomorphic encryption with access policies:characterization and new constructions[C]//Proceedings of the 20136th International Conference on Cryptology in Africa, LNCS 7918. Berlin:Springer, 2013:61-87. [3] KATZ J, SAHAI A, WATERS B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]//Proceedings of the 200827th Annual International Conference on Theory and Applications of Cryptographic Techniques:Advances in Cryptology. Berlin:Springer, 2008:146-162. [4] BONEH D, WATERS B. Conjunctive, subset, and range queries on encrypted data[C]//Proceedings of the 4th Theory of Cryptography Conference, LNCS 4392. Berlin:Springer, 2007:535-554. [5] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]//Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, LNCS 2139. Berlin:Springer, 2001:213-229. [6] MIAO Y B, MA J F, LIU Z Q. Revocable and anonymous searchable encryption in multi-user setting[J]. Concurrency and Computation:Practice and Experience, 2016, 28(4):1204-1218. [7] YONG H H, LEE P J. Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]//Proceedings of the 2007 International Conference on Pairing-based Cryptograhpy, LNCS 4575. Berlin:Springer, 2007:2-22. [8] WANG P S, WANG H X, PIEPRZYK J. Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups[C]//Proceedings of the 20087th International Conference on Cryptology and Network Security, LNCS 5339. Berlin:Springer, 2008:178-195. [9] 王尚平,刘利军,张亚玲.可验证的基于词典的可搜索加密方案[J].软件学报,2016,27(5):1301-1308. (WANG S P, LIU L J, ZHANG Y L. Verifiable dictionary-based searchable encryption scheme[J]. Journal of Software, 2016, 27(5):1301-1308.) [10] LI J W, LI J, CHEN X F, et al. Privacy-preserving data utilization in hybrid clouds [J]. Future Generation Computer Systems, 2014, 30(1): 98-106. [11] GOLLE P, STADDON J, WATERS B. Secure conjunctive keyword search over encrypted data [C]// Proceedings of the 2004 Second International Conference on Applied Cryptography and Network Security, LNCS 3089. Berlin: Springer, 2004: 31-45. [12] KERSCHBAUM F. Secure conjunctive keyword searches for unstructured text [C]// Proceedings of the 20115th International Conference on Network and System Security. Piscataway, NJ: IEEE, 2011: 285-289. [13] CUI B J, LIU Z L, WANG L Y. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage [J]. IEEE Transactions on Computers, 2016, 65(8): 2374-2385. [14] PENG Y G, CUI J T, PENG C G, et al. Certificateless public key encryption with keyword search [J]. China Communications, 2014, 11(11): 100-113. [15] YANG Y, MA M D, LIN B G. Proxy re-encryption conjunctive keyword search against keyword guessing attack[C]// Proceedings of the 2013 Computing, Communications and IT Applications Conference. Piscataway, NJ: IEEE, 2013: 125-130. |