[14] |
YAN X X , NI H , LIU Y ,et al. Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR[J]. Computer Science and Information Systems, 2019,13(6): 831-847.
|
[15] |
WATERS B . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[J]. Lecture Notes in Computer Science, 2011,(6571): 53-70.
|
[16] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[J]. Lecture Notes in Computer Science, 2001,(2139): 213-229.
|
[17] |
ZHANG W , ZHANG Z S , XIONG H ,et al. PHAS-HEKR-CP-ABE:partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system[J]. Journal of Ambient Intelligence and Humanized Computing, 2021(4): 1-15.
|
[18] |
MA M M , LUO M , FAN S Q ,et al. An efficient pairing-free certicateless searchable public key encryption for cloud-based IIoT[J]. Wireless Communications and Mobile Computing, 2020: 1-11.
|
[19] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communication Security, 2006: 89-98.
|
[1] |
SONG D , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy. 2000: 44-55.
|
[2] |
LIU Z Y , XU C G , YAO Z G . Forward secure searchable encryption with conjunctive-keyword supporting multi-user[C]// 3rd International Conference on Security and Privacy in New Computing Environments. 2021: 423-440.
|
[3] |
GE X R , YU J , HU C ,et al. Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing[J]. IEEE Access, 2018(6): 45725-45739.
|
[4] |
LIN W Y , CUI H L , LI B C ,et al. Privacy-preserving similarity search with efficient updates in distributed key-value stores[J]. IEEE Transactions on Parallel and Distributed Systems, 2021,32(5): 1072-1084.
|
[5] |
AHMED MA , RAMACHANDRAM S , KHAN KUR . Conjunctive keyword forward secure ranked dynamic searchable encryption over outsourced encrypted data[C]// 8th International Symposium on Security in Computing and Communications (SSCC 2020). 2020: 197-212.
|
[6] |
ZHANG Y , LI Y , WANG Y F . Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search[J]. Security and Communication Networks, 2020.
|
[7] |
高诗尧, 陈燕俐, 许玉岚 . 云环境下基于属性的多关键字可搜索加密方案[J]. 计算机科学, 2021,9(6): 1-15.
|
|
GAO S Y , CHEN Y L , XU Y L . Property-based multi-keyword searchable encryption schemes in a cloud environment[J]. Computer Science, 2021,9(6): 1-15.
|
[8] |
LIU X Y , LU T T , HE X M ,et al. Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication[J]. IEEE Access, 2020(8): 52062-52074.
|
[9] |
张玉磊, 刘文静, 刘祥震 ,等. 基于授权的多服务器可搜索密文策略属性基加密方案[J]. 电子与信息学报, 2019,41(8): 1808-1814.
|
|
ZHANG Y L , LIU W J , LIU X Z ,et al. Authorization-based mul-ti-server can search for a cipheric policy attribute-based encryption scheme[J]. Journal of Electronics and Informatics, 2019,41(8): 1808-1814.
|
[10] |
SONG X Y , ZHOU Z , DUAN W J ,et al. Attribute-based searchable encryption scheme with fuzzy keywords[J]// Computer Science, 2021: 44-61.
|
[11] |
牛淑芬, 谢亚亚, 杨平平 ,等. 区块链上基于云辅助的属性基可搜索加密方案[J]. 计算机研究与发展, 2021,58(4): 811-821.
|
|
NIU S F , XIE Y Y , YANG P P ,et al. Cloud-based attribute bases on the blockchain are searchable for encryption schemes[J]. Computer Research and Development, 2021,58(4): 811-821.
|
[12] |
MIAO Y B , MA J F , LIU X M ,et al. Attribute-based keyword search over hierarchical data in cloud computing[J]. IEEE Transactions on Services Computing, 2020,13(6): 985-998.
|
[13] |
WU A , ZHENG D , ZHANG Y ,et al. Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing[J]. Sensors, 2018,18(7).
|