[1] BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]//Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin:Springer, 2004:506-522. [2] 董晓蕾,周俊,曹珍富.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120.(DONG X L, ZHOU J, CAO Z F. Research advances on secure searchable encryption[J]. Journal of Computer Research and Development, 2017, 54(10):2107-2120.) [3] BAEK J, SAFAVI-NAINI R, SUSILO W. Public key encryption with keyword search revisited[C]//Proceedings of the 2008 International Conference on Computational Science and Its Applications, LNCS 5072. Berlin:Springer, 2008:1249-1259. [4] XU P, JIN H, WU Q, et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013, 62(11):2266-2277. [5] MA M, HE D, KUMAR N, et al. Certificateless searchable public key encryption scheme for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(2):759-767. [6] LIU Z, LI T, LI P, et al. Verifiable searchable encryption with aggregate keys for data sharing system[J]. Future Generation Computer Systems, 2018, 78:778-788. [7] 伍祈应,马建峰,苗银宾,等.多数据拥有者认证的密文检索方法[J].通信学报,2017,38(11):161-170.(WU Q Y, MA J F, MIAO Y B, et al. Multi-owner accredited keyword search over encrypted data[J]. Journal on Communications, 2017, 38(11):161-170.) [8] 白平,张薇,李聪,等.支持用户撤销的可验证密文检索方案[J].计算机应用,2018,38(6):1640-1643.(BAI P, ZHANG W, LI C, et al. Verifiable ciphertext retrieval scheme with user revocation[J]. Journal of Computer Applications, 2018, 38(6):1640-1643.) [9] WANG G, LIU Q, WU J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security. New York:ACM, 2010:735-737. [10] LEE C C, LI C T, CHEN C L, et al. A searchable hierarchical conditional proxy re-encryption scheme for cloud storage services[J]. Information Technology and Control, 2016, 45(3):289-299. [11] WANG X, ZHANG X, MU Y. Hierarchical ID-based searchable encryption with constant size ciphertext in cloud[C]//Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom. Piscataway:IEEE, 2015:1024-1031. [12] SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5):1484-1509. [13] REGEV O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM, 2009, 56(6):No.34. [14] HOFFSTEIN J, PIPHER J, SILVERMAN J H. NSS:an NTRU lattice-based signature scheme[C]//Proceedings of the 2001 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2045. Berlin:Springer, 2001:211-228. [15] KATZ J, VAIKUNTANATHAN V. Smooth projective hashing and password-based authenticated key exchange from lattices[C]//Proceedings of the 2009 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 5912. Berlin:Springer, 2009:636-652. [16] PEIKERT C, SHIEHIAN S. Multi-key FHE from LWE, revisited[C]//Proceedings of the 2016 Theory of Cryptography Conference, LNCS 9986. Berlin:Springer, 2016:217-238. [17] GU C, GUANG Y, ZHU Y, et al. Public key encryption with keyword search from lattices[J]. International Journal of Information Technology, 2013, 19(1):1-10. [18] HOU C J, LIU F, BAI H, et al. Public-key encryption with keyword search from lattice[C]//Proceedings of the 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Piscataway:IEEE, 2013:336-339. [19] ZHANG X, XU C. Trapdoor security lattice-based public-key searchable encryption with a designated cloud server[J]. Wireless Personal Communications, 2018, 100(3):907-921. [20] YANG Y, ZHENG X, CHANG V, et al. Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud[J]. Multimedia Tools and Applications, 2018, 77(8):9927-9941. [21] ZHANG X, TANG Y, WANG H, et al. Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage[J]. Information Sciences, 2019, 494:193-207. [22] XU L, YUAN X, STEINFELD R, et al. Multi-writer searchable encryption:an LWE-based realization and implementation[C]//Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York:ACM, 2019:122-133. [23] ALWEN J, PEIKERT C. Generating shorter bases for hard random lattices[J]. Theory of Computing Systems, 2011, 48(3):535-553. [24] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]//Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York:ACM, 2008:197-206. [25] YE J, WANG J, ZHAO J, et al. Fine-grained searchable encryption in multi-user setting[J]. Soft Computing, 2017, 21(20):6201-6212. [26] WANG S, GAO T, ZHANG Y. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage[J]. PLoS One, 2018, 13(11):e0206126. [27] MIAO Y, MA J, JIANG Q, et al. Verifiable keyword search over encrypted cloud data in smart city[J]. Computers and Electrical Engineering, 2018, 65:90-101. [28] LIU Y, ZHANG Y, LING J, et al. Secure and fine-grained access control on e-healthcare records in mobile cloud computing[J]. Future Generation Computer Systems, 2018, 78:1020-1026. |