[1]霍成义. 云计算数据隐私保护关键技术研究[J]. 信息安全研究, 2019, 5(12): 11061109[2]Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C] Proc of IEEE Symp on Security & Privacy. Piscataway, NJ: IEEE, 2002: 4455[3]Shao Jun, Cao Zhenfu, Liang Xiaohui, et al. Proxy reencryption with keyword search[J]. Information Sciences, 2010, 180(13): 25762587[4]Gao Nan, Fan Kai, Wang Haoyang, et al. Ciphertext retrieval with identity bidirectional authentication and matrix index in IoT[J]. IEEE Internet of Things Journal, 2023, 11(1): 889903[5]Bao Luwei, Lu Gehao. Cloud storage ciphertext search scheme based on blockchain[C] Proc of 2022 Int Conf on Information Technology, Communication Ecosystem and Management. Piscataway, NJ: IEEE, 2022: 2933[6]Sun Zhen, Liu Bo. Blockchainbased supply chain financial ciphertext retrieval system[C] Proc of the 2nd IEEE Int Conf on Electrical Engineering, Big Data and Algorithms. Piscataway, NJ: IEEE, 2023: 14311436[7]Chen Hao, Lv Xixiang, Zheng Wei, et al. VerFHS: Verifiable image retrieval on forward privacy in blockchainenabled IoT[J]. IEEE Internet of Things Journal, 2023, 10(19): 1746517478[8]杨光远, 杨大利, 张羽, 等. 基于可信硬件的隐私数据可搜索加密加速方法研究[J]. 信息安全研究, 2021, 7(4): 319327[9]Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[G] LNCS 1403: Proc of Int Conf on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1998: 127144[10]Zhong Weidong, Wang Xuan, Wang Ziqing, et al. Proxy reencryption with keyword search from anonymous conditional proxy reencryption[C] Proc of the 7th Int Conf on Computational Intelligence and Security. Piscataway, NJ: IEEE, 2011: 969973[11]Yu Xiaoling, Xu Chungen, Dou Bennian, et al. Multiuser search on the encrypted multimedia database: Latticebased searchable encryption scheme with timecontrolled proxy reencryption[J]. Multimedia Tools and Applications, 2021, 80: 31933211[12]Li Chuanping, Tang Juxiang. Searchable proxy reencryption data sharing scheme based on consortium chain[C] Proc of the 3rd Int Conf on Computer Science and Blockchain. Piscataway, NJ: IEEE, 2023: 121132[13]Niu Shufen, Chen Lixia, Liu Wenke. Attributebased keyword search encryption scheme with verifiable ciphertext via blockchains[C] Proc of the 9th IEEE Joint Int Information Technology and Artificial Intelligence Conference. Piscataway, NJ: IEEE, 2020: 849853[14]Yan Xixi, Yuan Xiaohan, Tang Yongli, et al. Verifiable attributebased searchable encryption scheme based on blockchain[J]. Journal on Communications, 2020, 41(2): 187198
|