[1] SONG D X, WAGNER D, PERRING A. Practical techniques for searches on encrypted data[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2000:44-55. [2] CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]//Proceedings of the 2005 International Conference on Applied Cryptography and Network Security. New York:ACM, 2005:442-455. [3] GOH E J. Secure Indexes[EB/OL]. (2004-03-16)[2018-05-28]. http://eprint.iacr.org/2003/216. [4] CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011, 19(5):895-934. [5] LIESDONK P V, SEDGHI S, DOUMEN J, et al. Computationally efficient searchable symmetric encryption[J]. Secure Data Management, 2010, 63(58):87-100. [6] KAMARA S, PAPAMANTHOU C. Parallel and dynamic searchable symmetric encryption[C]//Proceedings of the 2013 International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2013:258-274. [7] YANG C, ZHANG W, XU J, et al. A fast privacy-preserving multi-keyword search scheme on cloud data[C]//Proceedings of the 2013 International Conference on Cloud and Service Computing. Washington, DC:IEEE Computer Society, 2013:104-110. [8] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(1):222-233. [9] XU J, ZHANG W, YANG C, et al. Two-step-ranking secure multi-keyword search over encrypted cloud data[C]//Proceedings of the 2012 International Conference on Cloud and Service Computing. Washington, DC:IEEE Computer Society, 2012:124-130. [10] 李倩,岳风顺,王国军.安全云存储中高效的多关键词查找方案[J].计算机科学,2012,39(12):158-161.(LI Q, YUE F S, WANG G J. Efficient multi-keyword search over secure cloud storage[J]. Computer Science, 2012,39(12):158-161.) [11] 冯加军,王晓琳,田青.基于计数型布隆过滤器的文本检索模型[J].计算机工程,2014,40(2):58-61.(FENG J J, WANG X L, TIAN Q. Text retrieval model based on counting bloom filter[J]. Computer Engineering, 2014, 40(2):58-61.) [12] FU Z, SUN X, LINGE N, et al. Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J]. IEEE Transactions on Consumer Electronics, 2014, 60(1):164-172. [13] XIA Z, ZHU Y, SUN X, et al. Secure semantic expansion based search over encrypted cloud data supporting similarity ranking[J]. Journal of Cloud Computing:Advances, Systems and Applications, 2014, 3(1):1-11. [14] 何亨,夏薇,张继,等.一种云环境中密文数据的模糊多关键词检索方案[J].计算机科学,2017,44(5):146-152.(HE H, XIA W, ZHANG J, et al. Fuzzy multi-keyword retrieval scheme over encrypted data in cloud computing[J]. Computer Science, 2017, 44(5):146-152.) [15] 黄汝维,李志坤,江恩玮,等.云计算环境中支持模糊检索的加密算法[J].广西大学学报(自然科学版),2017,42(3):1121-1130.(HUANG R W, LI Z K, JIANG E W, et al. An encryption algorithm supporting fuzzy retrieval in cloud computing[J]. Journal of Guangxi University (Natural Science Edition), 2017, 42(3):1121-1130.) [16] ZHANG W, XIAO S, LIN Y, et al. Secure ranked multi-keyword search for multiple data owners in cloud computing[C]//Proceedings of the 2017 IEEE International Conference on Parallel and Distributed Systems. Piscataway, NJ:IEEE, 2017:276-286. [17] MANNING C D, RAGHAVAN P. Introduction to Information Retrieval[M]. Cambridge, UK:Cambridge University Press, 2010:79-113. [18] RISTAD E S, YIANILOS P N. Learning string-edit distance[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20(5):522-532. [19] MILLER G A, BECKWITH R, FELLBAUM C, et al. WordNet:An Electronic Lexical Database[M]. Cambridge, MA:MIT Press, 1998:156-178. [20] WITTEN I H, MOFFAT A, BELL T C. Managing gigabytes:compressing and indexing documents and images[J]. IEEE Transactions on Information Theory, 1995, 41(6):79-80. [21] FU Z, WU X, WANG Q, et al. Enabling central keyword-based semantic extension search over encrypted outsourced data[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(12):2986-2997. [22] FRANZEN K, KARLGEN J. Verbosity and interface design[R]. Kista:Swedish Institute of Computer Science, 2000:5. |