[1]Boneh D, Crescenzo G D, Ostrovsky R, et al. Public key encryption with keyword search[G] LNCS 3027: Proc of Eurocrypt 2004. Berlin: Springer, 2004: 506522
[2]Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extension[J]. Journal of Cryptology, 2008, 21(3): 350391
[3]Rhee H S, Park J H, Susilo W, et al. Trapdoor security in a searchable publickey encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763771
[4]Fang L, Susilo W, Ge C, et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Science, 2013, 238(20): 221241
[5]Hwang Y H, Lee P J. Public key encryption with conjunctive keyword search and its extension to a multiuser system[G] LNCS 4757: Proc of Pairing 2007. Berlin: Springer, 2007: 222
[6]Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data[G] LNCS 4392: Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007: 535554
[7]Shi E, Bethencourt J, Chan H, et al, Multidimensional range query over encrypted data[C] Proc of the 2007 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2007: 350364
[8]Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers[G] LNCS 5094: Proc of DBSec 2008. Berlin: Springer, 2008: 127143
[9]Sun W, Yu W, Lou W, et al. Protecting your right: Attributebased keyword search with finegrained ownerenforced search authorization in the cloud[C] Proc of IEEE INFOCOM 2014. Los Alamitos, CA: IEEE Computer Society, 2014: 1851
[10]Wang P, Wang H, Pieprzyk J. Keyword fieldfree conjunctive keyword searches on encrypted data and extension for dynamic group[G] LNCS 5339: Proc of CANS 2008. Berlin: Springer, 2008: 178195
[11]Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption[C] Proc of ACM CCS 2012. New York: ACM, 2012: 965976
[12]Goh E. Secure Indexes[DBOL]. Cryptology ePrint Archive, Report 2003216. 2003 [20151104]. http:eprint.iacr.org2003216
[13]Curtmola R, Garay J, Kamara S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[C] Proc of ACM CCS 2006. New York: ACM, 2006: 7988
[14]Kurosawa K, Ohtaki Y. UCsecure searchable symmetric encryption[G] LNCS 7397: Proc of the 16th Int Financial Conf. Berlin: Springer, 2012: 285298
[15]Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C] Proc of IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2000: 4455
[16]Amanatidis G, Boldyreva A, ONeill A. Provablysecure schemes for basic query support in outsourced databases[G] LNCS 4602: Proc of DBSec 2007. Berlin: Springer, 2007: 1430
[17]Chase M, Kamara S. Structured encryption and controlled disclosure[G] LNCS 6477: Proc of ASIACRYPT 2010. Berlin: Springer, 2010: 577594
[18]Agrawal R, Kiernan J, Srikant R, et al. Orderpreserving encryption for numeric data[C] Proc of SIGMOD 2004. New York: ACM, 2004: 563574
[19]Li Rui, Liu A X, Wang A L, et al. Fast range query processing with strong privacy protection for cloud computing[C] Proc of the 40th VLDB. Berlin: Springer, 2014: 19531964
[20]Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data[G] LNCS 3089: Proc of ACNS. Berlin: Springer, 2004: 3145
[21]Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data[G] LNCS 3783: Proc of ICICS. Berlin: Springer, 2005: 414426
[22]Byun J W, Lee D H, Lim J. Efficient conjunctive keyword search on encrypted data storage system[G] LNCS 4043: Proc of EuroPKI 2006. Berlin: Springer, 2006: 184196
[23]Cash D, Jarecki S, Jutla C S, et al. Highlyscalable searchable symmetric encryption with support for Boolean queries[G] LNCS 8042: Proc of CRYPTO 2013. Berlin: Springer, 2013: 353373
[24]Jarecki S, Jutla C, Krawczyk H, et al. Outsourced symmetric private information retrieval[C] Proc of ACM CCS 2013. New York: ACM, 2013: 875888
[25]Shen E, Shi E, Waters B. Predicate privacy in encryption systems[G] LNCS 5444: Proc of TCC 2009. Berlin: Springer, 2009: 457473
[26]Cao Ning, Wang Cong, Li Ming, et al. Privacypreserving multikeyword ranked search over encrypted cloud data[C] Proc of IEEE INFOCOM 2011. Los Alamitos, CA: IEEE Computer Society, 2011: 829837
[27]Bosch C, Tang Q, Hartel P, et al. Selective document retrieval from encrypted database[G] LNCS 7483: Proc of ISC 2012. Berlin: Springer, 2012: 224241
[28]Kuzu M, Saiful Islam M, Kantarcioglu M. Efficient similarity search over encrypted data[C] Proc of ICDE 2012. Los Alamitos, CA: IEEE Computer Society, 2012: 11561167
[29]Sun W, Wang B, Cao Ning, et al. Verifiable privacy preserving multikeyword text search in the cloud supporting similaritybased ranking[J]. IEEE Trans on Parallel and Distributed Systems, 2013, 25(11): 30253035[30]Li H, Yang Y, Luan T H, et al. Enabling finegrained multikeyword search supporting classified subdictionaries over encrypted cloud data[J]. IEEE Trans on Dependable and Secure Computing, 2015, 99: 113
[31]Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption[C] Proc of Financial Cryptography (FC) 2013. Berlin: Springer, 2013: 258274
[32]Stefanov E, Papamanthou C, Shi E. Practical dynamic searchable encryption with small leakage[C] Proc of NDSS 2014. Los Alamitos, CA: IEEE Computer Society, 2014: 212226
[33]Cash D, Jaeger J, Jarecki S, et al. Dynamic searchable encryption in verylarge databases: Data structures and implementation[C] Proc of NDSS 2014. Berlin: Springer, 2014: 8892
[34]Hahn F, Kerschbaum F. Searchable encryption with secure and efficient updates[C] Proc of ACM CCS 2014. New York: ACM, 2014: 310320
[35]Bellovin S, Cheswick W. Privacyenhanced searches using encrypted bloom filters[DBOL]. IACR Cryptology ePrint Archive, 2004 [20151104]. http:eprint.iacr.org2004022
[36]Raykova M, Vo B, Bellovin S M, et al. Secure anonymous database search[C] Proc of CCSW 2009. New York: ACM, 2009: 115126
[37]Yang Y, Lu H, Weng J. Multiuser private keyword search for cloud computing[C] Proc of IEEE CloudCom 2011. Los Alamitos, CA: IEEE Computer Society, 2011: 264271 |