1 |
工业和信息化部电信研究院.云计算白皮书(2012年)[R/OL].[2020-12-13]. [R/OL].[2020-12-13].). 10.32894/kujss.2019.15.2.1
|
2 |
ARMBRUST M,FOX A, GRIFFITH R,et al. A view of cloud computing [J]. Communications of the ACM, 2010, 53(4): 50-58. 10.1145/1721654.1721672
|
3 |
GOLDREICH O,OSTROVSKY R.Software protection and simulation on oblivious RAMs [J]. Journal of the ACM, 1996, 43(3): 431-473. 10.1145/233551.233553
|
4 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data [C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2000: 44-55. 10.1109/secpri.2000.848445
|
5 |
GOH E J. Secure indexes: report2003/216 [R/OL]. (2004-03-16) [2020-12-13]. . 10.1023/a:1021928209813
|
6 |
CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data: report2004/051 [R/OL]. (2004-03-16) [2020-12-13]. . 10.1007/11496137_30
|
7 |
WATANABE C, ARAI Y. Privacy-preserving queries for a DAS model using encrypted bloom filter [C]// Proceedings of the 2009 International Conference on Database Systems for Advanced Applications, LNCS5463. Berlin: Springer, 2009: 491-495.
|
8 |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions [C]// Proceedings of the 2006 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 79-88. 10.1145/1180405.1180417
|
9 |
KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic searchable symmetric encryption [C]// Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York: ACM, 2012: 965-976. 10.1145/2382196.2382298
|
10 |
KAMARA S, PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption [C]// Proceedings of the 2013 International Conference on Financial Cryptography and Data Security, LNCS7859. Berlin: Springer, 2013: 258-274.
|
11 |
STEFANOV E, PAPAMANTHOU C, SHI E. Practical dynamic searchable encryption with small leakage [C]// Proceedings of the 2014 21st Annual Network and Distributed System Security Symposium. Reston: Internet Society, 2014: Article No.23298. 10.14722/ndss.2014.23298
|
12 |
CASH D, JAEGER J, JARECKI S, et al. Dynamic searchable encryption in very large databases: data structures and implementation [C]// Proceedings of the 2014 21st Annual Network and Distributed System Security Symposium. Reston: Internet Society, 2014: Article No.23264. 10.14722/ndss.2014.23264
|
13 |
NAVEED M, PRABHAKARAN M, GUNTER C A. Dynamic searchable encryption via blind storage: report2014/219 [R/OL]. (2014-03-26) [2020-12-17]. . 10.1109/sp.2014.47
|
14 |
HAHN F, KERSCHBAUM F. Searchable encryption with secure and efficient updates [C]// Proceedings of the 2014 21st ACM Conference on Computer and Communications Security. New York: ACM, 2014: 310-320. 10.1145/2660267.2660297
|
15 |
孙晓玲,杨秋格,沈焱萍,等.改进的高效动态可搜索加密方案[J].计算机应用研究,2020,37(8):2472-2476.
|
|
SUN X L, YANG Q G, SHEN Y P, et al. Improved efficient dynamic searchable encryption [J]. Application Research of Computers, 2020, 37(8): 2472-2476.
|
16 |
杜军强,杨波.云计算中加密数据的模糊关键字搜索方法[J].计算机工程与应用,2015,51(5):146-152, 227. 10.3778/j.issn.1002-8331.1303-0508
|
|
DU J Q, YANG B. Fuzzy keyword search method over encrypted data in cloud computing [J]. Computer Engineering and Applications, 2015, 51(5): 146-152, 227. 10.3778/j.issn.1002-8331.1303-0508
|
17 |
XIA Z H, WANG X H, SUN X M, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. 10.1109/tpds.2015.2401003
|
18 |
FU Z J, WU X L, GUAN C W, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement [J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706-2716. 10.1109/tifs.2016.2596138
|
19 |
严小龙,庞晓琼,任孟琦.支持动态更新的多关键词密文排序检索[J].计算机工程与设计,2018,39(4):901-906. 10.16208/j.issn1000-7024.2018.04.001
|
|
YAN X L, PANG X Q, REN M Q. Multi-keyword ranked search method supporting dynamic update [J]. Computer Engineering and Design, 2018, 39(4): 901-906. 10.16208/j.issn1000-7024.2018.04.001
|
20 |
杨旸,刘佳,蔡圣暐,等.云计算中保护数据隐私的快速多关键词语义排序搜索方案[J].计算机学报,2018,41(6):1346-1359. 10.11897/SP.J.1016.2018.01346
|
|
YANG Y, LIU J, CAI S W, et al. Fast multi-keyword semantic ranked search in cloud computing [J]. Chinese Journal of Computers, 2018, 41(6): 1346-1359. 10.11897/SP.J.1016.2018.01346
|
21 |
吴志强,李肯立,郑蕙.高效可扩展的对称密文检索架构[J].通信学报,2017,38(8):79-93. 10.11959/j.issn.1000-436x.2017166
|
|
WU Z Q, LI K L, ZHENG H. Efficient and scalable architecture for searchable symmetric encryption [J]. Journal on Communications, 2017, 38(8):79-93. 10.11959/j.issn.1000-436x.2017166
|
22 |
贾强,张帅,周福才.一种面向密文大型数据集的可搜索加密方案[J].东北大学学报(自然科学版),2019,40(7):913-919. 10.12068/j.issn.1005-3026.2019.07.001
|
|
JIA Q, ZHANG S, ZHOU F C. A searchable encryption scheme for encrypted large data sets [J]. Journal of Northeastern University (Natural Science), 2019, 40(7): 913 -919. 10.12068/j.issn.1005-3026.2019.07.001
|