Computer Science ›› 2019, Vol. 46 ›› Issue (7): 91-95.doi: 10.11896/j.issn.1002-137X.2019.07.014
• Information Security • Previous Articles Next Articles
WANG Shao-hui,ZHANG Yan-xuan,WANG Hua-qun,XIAO Fu,WANG Ru-chuan
CLC Number:
[1]SONG D X,WAGNER D,PERRIG A.Practical Techniques for Searches on Encrypted Data[C]∥IEEE Symposium on Security &Privacy.Berkeley,CA,USA:IEEE Computer Society,2000:44-55. [2]BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Public Key Encryption with Keyword Search[C]∥International Conference on the Theory and Applications of Cryptographic Techniques.Heidelberg,Berlin:Springer,2004:506-522. [3]DONG J P,KIM K,LEE P J.Public Key Encryption with Conjunctive Field Keyword Search[C]∥International Conference on Information Security Applications.Heidelberg,Berlin:Springer,2004:73-86. [4]ZHANG R,XUE R,LIU L,et al.Oblivious Multi-Keyword Search for Secure Cloud Storage Service[C]∥IEEE Internatio-nal Conference on Web Services.Honolulu,Hawaii,USA:IEEE Computer Society,2017:269-276. [5]CHANG Y J,WU J L.Multi-user Searchable Encryption Scheme with Constant-Size Keys[C]∥IEEE International Symposium on Cloud and Service Computing.Kanazawa,Japan:IEEE,2018:98-103. [6]BYUN J,RHEE H,PARK H A,et al.Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data[J].Lecture Notes in Computer Science,2006,4165:75-83. [7]JEONG I R,KWON J O,HONG D,et al.Constructing PEKS schemes secure against keyword guessing attacks is possible?[J].Computer Communications,2009,32(2):394-396. [8]BAEK J,SAFAVINAINI R,SUSILO W.Public key encryption with keyword search revisited[C]∥International conference on Computational Science and Its Applications.Heidelberg,Berlin:Springer,2008:1249-1259. [9]RHEE H S,PARK J H,SUSILO W,et al.Trapdoor security in a searchable public-key encryption scheme with a designated tester[J].Journal of Systems & Software,2010,83(5):763-771. [10]RHEE H S.Secure searchable public key encryption scheme against keyword guessing attacks[J].Ieice Electronics Express,2009,6(5):237-243. [11]LU Y,WANG G,LI J,et al.Efficient designated server identity-based encryption with conjunctive keyword search[J].Annals of Telecommunications,2017,72(5/6):1-12. [12]WANG C H,TU T Y.Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J].Journal of Shanghai Jiaotong University(Science),2014,19(4):440-442. [13]SUN L,XU C,ZHANG M,et al.Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation[J].Science China(Information Scie-nces),2018,61(3):1-3. [14]HUANG Q,LI H.An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J].Information Sciences,2017,403-404:1-14. [15]BONEH D,BOVEN X,SHACHAM H.Short Group Signatures[C]∥International Cryptology Conference.Heidelberg,Berlin:Springer,2004:41-55. [16]SHAO Z Y,YANG B.On security against the server in designated tester public key encryption with keyword search[J].Information Processing Letters,2015,115(12):957-961. |
[1] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[2] | ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308. |
[3] | JI Yan, DAI Hua, JIANG Ying-ying, YANG Geng, Yi Xun. Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds [J]. Computer Science, 2021, 48(5): 320-327. |
[4] | MA Yin-fang and ZHANG Lin. LBS Group Nearest Neighbor Query Method Based on Differential Privacy [J]. Computer Science, 2017, 44(Z6): 336-341. |
[5] | LI Xiao-rong, SONG Zi-ye, REN Jing-yi, XU Lei and XU Chun-gen. Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing [J]. Computer Science, 2017, 44(Z11): 342-347. |
[6] | LI Lei, JIA Hui-wen, BAN Xue-hua and HE Yu-fan. Obfuscation-based Broadcasting Multi-signature Scheme [J]. Computer Science, 2017, 44(Z11): 329-333. |
[7] | CHEN Chao-qun and LI Zhi-hua. Privacy-preserving Oriented Ciphertext Retrieval Algorithm [J]. Computer Science, 2016, 43(Z11): 346-351. |
[8] | DUAN Yang-yang and LI Shi-yang. Anonymous Multi-user Searchable Encryption Scheme with Hierarchial Permission Management [J]. Computer Science, 2016, 43(2): 159-162. |
[9] | LIU Shu-bo, LI Yan-min and LIU Meng-jun. Privacy-preserving for Location-based Service over Encrypted Data Search [J]. Computer Science, 2015, 42(4): 101-105. |
[10] | FANG Zhong-jin, ZHOU Shu and XIA Zhi-hua. Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords [J]. Computer Science, 2015, 42(3): 136-139. |
[11] | FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong. Secure Channel Free Searchable Encryption in Standard Model [J]. Computer Science, 2015, 42(11): 197-202. |
[12] | WU Qi and WAN Chang-xuan. Multi-user Conjunctive Keyword Search Scheme over Ciphertext [J]. Computer Science, 2013, 40(9): 147-151. |
|