[1]Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C] Proc of the 2000 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2000: 4455[2]Goh E J. Secure indexes[EBOL]. 2003 [20210926]. https:eprint.iacr.org2003216.pdf[3]Curtmola R, Garay J, Kamara S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[C] Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 7988[4]Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption[C] Proc of the 2012 ACM Conf on Computer and Communications Security.New York: ACM, 2012: 965976[5]Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption[G] LNCS 7859: Proc of the 17th Int Conf on Financial Cryptography and Data Security. Berlin: Springer, 2013: 258274[6]Hahn F, Florian K. Searchable encryption with secure and efficient updates[C] Proc of ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2014: 310320 [7]孙晓玲, 杨秋格, 沈焱萍, 等.改进的高效动态可搜索加密方案[J]. 计算机应用研究, 2020, 37(8): 24722476[8]Kurosawa K, Ohtaki Y. How to update documents verifiably in searchable symmetric encryption[C] Proc of the 12th Int Conf on Cryptology and Network Security. Berlin: Springer, 2013: 309328[9]Kurosawa K, Sasaki K, Ohta K, et al. UCsecure dynamic searchable symmetric encryption scheme[C] Proc of the 11th Int Workshop on Security. Berlin: Springer, 2016: 7390[10]Peng Y, Liu Q, Tian Y, et al. Dynamic searchable symmetric encryption with forward and backward privacy[C] Proc of the 20th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications. Piscataway, NJ: IEEE, 2021: 420427[11]Javad G C, Dimitrios P P, Mohammadamin K, et al. Dynamic searchable encryption with optimal search in the presence of deletions[EBOL].[20231123]. https:eprint.iacr.org2022648.pdf[12]Bao F, Deng R H, Ding X, et al. Private query on encrypted data in multiuser settings [G] LNCS 4991: Proc of the 4th Int Conf on Information Security Practice and Experience. Berlin: Springer, 2008: 7185[13]Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers[G] LNCS 5094: Proc of the 22nd Annual IFIP WG 11.3 Working Conf on Data and Applications Security. Berlin: Springer, 2008: 127143[14]Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers[J]. Journal of Computer Security, 2011, 19(3): 367397[15]Sun S F, Liu J K, Sakzad A, et al. An efficient noninteractive multiclient searchable encryption with support for Boolean queries[G] LNCS 9878: Proc of Computer Security—ESORICS 2016. Berlin: Springer, 2016: 154172 [16]Guo C, Fu X, Mao Y, et al. Multiuser searchable symmetric encryption with dynamic updates for cloud computing[J]. Information, 2018, 9(10): 242 [17]Yang Y, Lu H, Weng J. Multiuser private keyword search for cloud computing[C] Proc of the 3rd IEEE Int Conf on Cloud Computing Technology and Science. Piscataway, NJ: IEEE, 2011: 264271[18]Nair M S, Rajasree M S. Finegrained search and access control in multiuser searchable encryption without shared keys[J]. Journal of Information Security and Applications, 2018, 41: 124133 [19]Liu X, Yang G, Mu Y, et al. Multiuser verifiable searchable symmetric encryption for cloud storage[J]. IEEE Trans on Dependable and Secure Computing, 2020, 17(6): 13221332[20]Chamani J G, Wang Y, Papadopoulos D, et al. Multiuser Dynamic searchable symmetric encryption with corrupted participants[J]. IEEE Trans on Dependable and Secure Computing, 2023, 20(1): 114130 [21]Certicom Research, Standards for Efficient Cryptography—SEC 1: Elliptic Curve Cryptography, Version 1.0[SOL].[20221126]. https:www.docin.comp941360317.html[22]汪朝晖. SM2椭圆曲线公钥密码算法综述[J]. 信息安全研究, 2016, 2(11): 972982 |