1 |
ZHANG L, XIONG H, HUANG Q, et al. Cryptographic solutions for cloud storage: challenges and research opportunities[J]. IEEE Transactions on Services Computing, 2022, 15(1): 567-587.
|
2 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2000: 44-55.
|
3 |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin: Springer, 2004: 506-522.
|
4 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98.
|
5 |
TANG Q, YUNG M. Cliptography: post-Snowden cryptography[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2017: 2615-2616.
|
6 |
BELLARE M, PATERSON K G, ROGAWAY P. Security of symmetric encryption against mass surveillance[C]// Proceedings of the 2014 Annual International Cryptology Conference, LNCS 8616. Berlin: Springer, 2014: 1-19.
|
7 |
MIRONOV I, STEPHENS-DAVIDOWITZ N. Cryptographic reverse firewalls[C]// Proceedings of the 2015 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 9057. Berlin: Springer, 2015: 657-686.
|
8 |
ZHENG Q, XU S, ATENIESE G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data[C]// Proceedings of the 2014 IEEE Conference on Computer Communications. Piscataway: IEEE, 2014: 522-530.
|
9 |
SUN W, YU S, LOU W, et al. Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187-1198.
|
10 |
WANG S, ZHANG D, ZHANG Y, et al. Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage[J]. IEEE Access, 2018, 6: 30444-30457.
|
11 |
WANG S, JIA S, ZHANG Y. Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage[J]. IEEE Access, 2019, 7: 50136-50147.
|
12 |
GE C, SUSILO W, LIU Z, et al. Secure keyword search and data sharing mechanism for cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(6): 2787-2800.
|
13 |
LI J, WANG M, LU Y, et al. ABKS-SKGA: attribute-based keyword search secure against keyword guessing attack[J]. Computer Standards and Interfaces, 2020, 74: No.103471.
|
14 |
HONG B, CHEN J, ZHANG K, et al. Multi-authority non-monotonic KP-ABE with cryptographic reverse firewall[J]. IEEE Access, 2019, 7: 159002-159012.
|
15 |
ZHOU Y, GUO J, LI F. Certificateless public key encryption with cryptographic reverse firewalls[J]. Journal of Systems Architecture, 2020, 109: No.101754.
|
16 |
OUYANG M, WANG Z, LI F. Digital signature with cryptographic reverse firewalls[J]. Journal of Systems Architecture, 2021, 116: No.102029.
|
17 |
LI G, LIU J, ZHANG Z, et al. UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module[C]// Proceedings of the 2021 International Conference on Information Security and Cryptology, LNCS 13007. Cham: Springer, 2021: 85-110.
|
18 |
WANG Y, CHEN R, HUANG X, et al. Secure anonymous communication on corrupted machines with reverse firewalls[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(6): 3837-3854.
|
19 |
ZHANG K, JIANG Z, NING J, et al. Subversion-resistant and consistent attribute-based keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1771-1784.
|
20 |
ZHOU Y, HU Z, LI F. Searchable public-key encryption with cryptographic reverse firewalls for cloud storage[J]. IEEE Transactions on Cloud Computing, 2023, 11(1): 383-396.
|
21 |
JI H, ZHANG H, SHAO L, et al. An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud[J]. Connection Science, 2021, 33(4): 1094-1115.
|
22 |
SUN Y, CHATTERJEE P, CHEN Y, et al. Efficient identity-based encryption with revocation for data privacy in Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(4): 2734-2743.
|
23 |
蒲浪,林超,伍玮,等. 基于SM9的公钥可搜索加密方案[J]. 信息安全学报, 2023, 8(1):108-118.
|
|
PU L, LIN C, WU W, et al. A public-key encryption with keyword search scheme from SM9[J]. Journal of Cyber Security, 2023, 8(1): 108-118.
|
24 |
熊虎,林烨,姚婷. 支持等式测试及密码逆向防火墙的SM9标识加密方案[J]. 计算机研究与发展, 2024, 61(4):1070-1084.
|
|
XIONG H, LIN Y, YAO T. SM9 identity-based encryption scheme with equality test and cryptographic reverse firewalls[J]. Journal of Computer Research and Development, 2024, 61(4): 1070-1084.
|