[1] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//SP'00:Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2000:44. [2] GOH E-J. Secure indexes[EB/OL].[2018-01-22]. http://www.comp.nus.edu.sg/~tankl/cs5322/readings/secureindex.pdf. [3] CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]//CCS'06:Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:79-88. [4] LIESDONK P V, SEDGHI S, DOUMEN J, et al. Computationally efficient searchable symmetric encryption[C]//Proceedings of the 2010 Workshop on Secure Data Management, LNCS 6358. Berlin:Springer, 2010:87-100. [5] KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic searchable symmetric encryption[C]//CCS'12:Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York:ACM, 2012:965-976. [6] KAMARA S, PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption[C]//Proceedings of the 2013 International Conference on Financial Cryptography and Data Security, LNCS 7859. Berlin:Springer, 2013:258-274. [7] WANG C, CAO N, LI J, et al. Secure ranked keyword search over encrypted cloud data[EB/OL].[2018-01-22]. http://www.ece.iit.edu/~ubisec/cloud/papers/ICDCS10-search.pdf. [8] 李倩,岳风顺,王国军.安全云存储中高效的多关键词查找方案[J].计算机科学,2012,39(12):158-161.(LI Q, YUE F S, WANG G J. Efficient multi-keyword search over secure cloud storage[J]. Computer Science, 2012, 39(12):158-161.) [9] 冯加军,王晓琳,田青.基于计数型布隆过滤器的文本检索模型[J].计算机工程,2014,40(2):58-61.(FENG J J, WANG X L, TIAN Q. Text retrieval model based on counting Bloom filter[J]. Computer Engineering, 2014, 40(2):58-61.) [10] XIA Z, WANG X, SUN X, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2):340-352. [11] WANG B, YU S, LOU W, et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]//Proceedings of the 2014 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE, 2014:2112-2120. [12] 何亨,夏薇,张继,等.一种云环境中密文数据的模糊多关键词检索方案[J].计算机科学,2017,44(5):146-152.(HE H, XIA W, ZHANG J, et al. Fuzzy multi-keyword retrieval scheme over encrypted data in cloud computing[J]. Computer Science, 2017, 44(5):146-152.) [13] BLOOM B H. Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7):422-426. [14] ROTTENSTREICH O, KANIZO Y, KESLASSY I. The variable-increment counting Bloom filter[EB/OL].[2018-01-22]. http://webee.technion.ac.il/~isaac/p/infocom12_variable.pdf. [15] ZHANG W, XIAO S, LIN Y, et al. Secure ranked multi-keyword search for multiple data owners in cloud computing[C]//DSN'14:Proceedings of the 201444th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Washington, DC:IEEE Computer Society, 2014:276-286. [16] 冯贵兰,谭良.云环境中基于多属性排序的密文检索方案[J].计算机科学,2013,40(11):131-136.(FENG G L, TAN L. Multi-attribute ranked keyword search over encrypted cloud data[J]. Computer Science, 2013, 40(11):131-136.) [17] COHEN W W. Enron email dataset[EB/OL].[2018-01-23]. http://www.cs.cmu.edu/~enron/. |