1 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data [C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2000:44-55.
|
2 |
GOLLE P, STADDON J, WATERS B. Secure conjunctive keyword search over encrypted data[C]// Proceedings of the 2nd International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2004: 31-45.
|
3 |
CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]// Proceedings of the 2011 International Conference on Computer Communications. Piscataway: IEEE, 2011: 829-837.
|
4 |
ORENCIK C, KANTARCIOGLU M, SAVAS E. A practical and secure multi-keyword search method over encrypted cloud data[C]// Proceedings of the 2013 IEEE 6th International Conference on Cloud Computing. Piscataway: IEEE, 2013: 390-397.
|
5 |
LI H, LIU D, DAI Y,et al. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage[J]. IEEE Transactions on Emerging Topics in Computing, 2015, 3(1): 127-138.
|
6 |
XIA Z, WANG X, SUN X, et al. A secure and dynamic multi- keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2):340-352.
|
7 |
CHEN C, ZHU X, SHEN P, et al. An efficient privacy-preserving ranked keyword search method[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 951-963.
|
8 |
FU Z, WU X, GUAN C, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706-2716.
|
9 |
王恺璇, 李宇溪, 周福才, 等. 面向多关键字的模糊密文搜索方法[J].计算机研究与发展, 2017, 54(2): 348-360.
|
|
WANG K X, LI Y X, ZHOU F C, et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
10 |
严小龙,庞晓琼,任孟琦. 支持动态更新的多关键词密文排序检索[J].计算机工程与设计,2018, 39(4): 901-906.
|
|
YAN X L, PANG X Q, REN M Q. Multi-keyword ranked search method supporting dynamic update[J].Computer Engineering and Design,2018,39(4): 901-906.
|
11 |
FU Z, HUANG F, REN K, et al. Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(8): 1874-1884.
|
12 |
VRANKEN H. Sustainability of bitcoin and blockchains[J]. Current Opinion in Environmental Sustainability, 2017, 28: 1-9.
|
13 |
HU S, CAI C, WANG Q, et al. Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization[C]// Proceedings of the 2018 International Conference on Computer Communications. Piscataway: IEEE, 2018: 792-800.
|
14 |
WANG S, ZHANG Y, ZHANG Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems[J]. IEEE Access, 2018, 6: 38437-38450.
|
15 |
ZHANG Y, DENG R H, SHU J, et al. TKSE: trustworthy keyword search over encrypted data with twoside verifiability via blockchain[J]. IEEE Access, 2018, 6: 31077-31087.
|
16 |
牛淑芬, 王金风, 王伯彬,等. 区块链上基于B+树索引结构的密文排序搜索方案[J]. 电子与信息学报, 2019, 41(10): 2409-2415.
|
|
NIU S F, WANG J F, WANG B B, et al. Ciphertext sorting search scheme based on B+ tree index structure on blockchain[J]. Journal of Electronics & Information Technology, 2019, 41(10): 2409-2415.
|
17 |
牛淑芬, 王金风, 王伯彬,等. 区块链上支持多关键字检索的可搜索加密方案[J]. 计算机工程与科学, 2020,42(11): 2005-2012.
|
|
NIU S F, WANG J F, WANG B B, et al. A searchable encryption scheme supporting multi-keyword retrieval on blockchain[J]. Computer Engineering & Science, 2020,42(11): 2005-2012.
|
18 |
LI H, GU C, CHEN Y, et al. An efficient, secure and reliable search scheme for dynamic updates with blockchain[C]// Proceedings of the 2019 9th International Conference on Communication and Network Security. New York: ACM, 2019: 51-57.
|
19 |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM,2006:79-88.
|