1 |
SAHAI A, WATERS B. Fuzzy identity-based encryption [C]// Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS3494. Berlin: Springer, 2005: 457-473.
|
2 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 2006 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. 10.1145/1180405.1180418
|
3 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11
|
4 |
WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization [C]// Proceedings of the 2011 International Workshop on Public Key Cryptography, LNCS6571. Berlin: Springer, 2011: 53-70.
|
5 |
LEWKO A, WATERS B. New proof methods for attribute-based encryption: achieving full security through selective techniques [C]// Proceedings of the 2012 Annual Cryptology Conference, LNCS7417. Berlin: Springer, 2012: 180-198.
|
6 |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search [C]// Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS3027. Berlin: Springer, 2004: 506-522.
|
7 |
SHAO Z Y, YANG B. On security against the server in designated tester public key encryption with keyword search [J]. Information Processing Letters, 2015, 115(12): 957-961. 10.1016/j.ipl.2015.07.006
|
8 |
徐磊,许春根,蔚晓玲.云存储上高效安全的数据检索方案[J].密码学报,2016,3(4):330-339. 10.13868/j.cnki.jcr.000132
|
|
XU L, XU C G, YU X L. Secure and efficient data retrieval scheme using searchable encryption in cloud [J]. Journal of Cryptologic Research, 2016, 3(4): 330-339. 10.13868/j.cnki.jcr.000132
|
9 |
HUANG Q, LI H B. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J]. Information Sciences, 2017, 403/404: 1-14. 10.1016/j.ins.2017.03.038
|
10 |
LU Y, LI J G. Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks [J]. International Journal of Communication Systems, 2019, 32(3): Article No.e3862. 10.1002/dac.3862
|
11 |
LU Y, LI J G. Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems [J]. Cluster Computing, 2019, 22(1): 285-299. 10.1007/s10586-018-2855-y
|
12 |
WANG C J, LI W T, LI Y, et al. A ciphertext-policy attribute-based encryption scheme supporting keyword search function [C]// Proceedings of the 2013 International Symposium on Cyberspace Safety and Security, LNCS8300. Cham: Springer, 2013: 377-386.
|
13 |
HAYATA J, ISHIZAKA M, SAKAI Y, et al. Generic construction of adaptively secure anonymous key-policy attribute-based encryption from public-key searchable encryption [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020, E103-A(1): 107-113. 10.1587/transfun.2019cip0014
|
14 |
CAO M S, WANG L H, QIN Z G, et al. A lightweight fine-grained search scheme over encrypted data in cloud-assisted wireless body area networks [J]. Wireless Communications and Mobile Computing, 2019, 2019: Article No.9340808. 10.1155/2019/9340808
|
15 |
GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts [C]// Proceedings of the 2011 20th USENIX Conference on Security. Berkeley: USENIX Association, 2011: 523-528.
|
16 |
陈冬冬,曹珍富,董晓蕾.在线/离线密文策略属性基可搜索加密[J].计算机研究与发展,2016(53):2365-2375.(CHEN D D, CAO Z F, DONG X L. Online/offline ciphertext-policy attribute-based searchable encryption [J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375.). 10.7544/issn1000-1239.2016.20160416
|
17 |
WANG S P, YAO L S, CHEN J J, et al. KS-ABESwET: a keyword searchable attribute-based encryption scheme with equality test in internet of things [J]. IEEE Access, 2019, 7: 80675-80696. 10.1109/access.2019.2922646
|
18 |
MIAO Y B, DENG R H, LIU X M, et al. Multi-authority attribute-based keyword search over encrypted cloud data [J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(4): 1667-1680. 10.1109/tdsc.2019.2935044
|
19 |
BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertext [C]// Proceedings of the 2005 Theory of Cryptography Conference, LNCS3378. Berlin: Springer, 2005: 325-341.
|