Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231100137-12.doi: 10.11896/jsjkx.231100137
• Information Security • Previous Articles Next Articles
YAN Li1, YIN Tian2, LIU Peishun2, FENG Hongxin2, WANG Gaozhou1, ZHANG Wenbin1, HU Hailin1, PAN Fading1
CLC Number:
[1]ZHANG Y,WANG X,LIU X,et al.Survey on Cloud Computing Security [J].Journal of Software,2016,27(6):1328-1348. [2]SONG D X D,WAGNER D,PERRIG A,et al.Practical techniques for searches on encrypted data[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy(S&P 2000).Berkeley,CA,USA,2000:14-17. [3]BONEH D,DI CRESCENZO G,OSTROVSKY R,et al.Public key encryption with keyword search [C]//Advances in Crypto-logy-Eurocrypt 2004,2004:506-522. [4]SAHAI A,WATERS B.Fuzzy identity-based encryption [C]//Advances in Cryptology-Eurocrypt 2005.2005:457-473. [5]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based en-cryption for fine-grained access control of encrypted data [C]//Proceedings of the 13th ACM conference on Computer and Communications Security.2006 [6]BETHENCOURT J,SAHAI A,WATERS B,et al.Ciphertext-policy attribute-based encryption [C]//Proceedings of the IEEE Symposium on Security and Privacy(S&P 2007).Berkeley,CA,2007:20-23. [7]KHADER D.Introduction to Attribute Based Searchable En-cryption[C]//Proceedings of the 15th Joint IFIP TC-6 and TC-11 International Conference on Communications and Multimedia Security(CMS).Univ Aveiro,Aveiro,PORTUGAL,2014:25-26. [8]ZHENG Q,XU S,ATENIESE G,et al.VABKS:Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data[C]//Proceedings of the 33rd IEEE Annual Conference on Computer Communications(IEEE INFOCOM).Toronto,CANADA,2014. [9]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Realization [C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography(PKC 2011).Taormina,ITALY,2011:6-9. [10]LEWKO A,WATERS B.New Proof Methods for Attribute-Based Encryption:Achieving Full Security through Selective Techniques[C]//Proceedings of the 32nd Annual International Cryptology Conference(CRYPTO).Santa Barbara,CA,2012:19-23. [11]WANG S,WANG J,DONG Q,et al.A Survey of Attribute-based Encryption Technology [J].Netinfo Security,2019(9):76-80. [12]NISHIDE T,YONEYAMA K,OHTA K.Attribute-based encryption with partially hidden encryptor-specified access structures[C]//Proceedings of the 5th International Conference on Applied Cryptography and Network Security.New York,NY,2008:3-6. [13]LAI J,DENG R H,LI Y.Fully secure cipertext-policy hidingCP-ABE[C]//proceedings of the Information Security Practice and Experience:7th International Conference(ISPEC 2011).Guangzhou,China,2011. [14]BALU A,KUPPUSAMY K.Privacy Preserving Ciphertext Policy Attribute Based Encryption [C]//Proceedings of the 3rd International Conference on Network Security and Applications.Chennai,INDIA,2010:23-25. [15]LAI J,DENG R H,LI Y,et al.Expressive CP-ABE with Partially Hidden Access Structures[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security(ASIACCS).Korea Federat Sci & Technol Soc,Seoul,SOUTH AFRICA,2012:2-4. [16]ZHANG Y,DENG R H,HAN G,et al.Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things [J].Journal of Network and Computer Applications,2018,123:89-100. [17]KOO D,HUR J,YOON H.Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage [J].Computers & Electrical Engineering,2013,39(1):34-46. [18]CHAUDHARI P,DAS M L.On the security of a searchableanonymous attribute based encryption[C]//Proceedings of the Mathematics and Computing:Third International Conference(ICMC 2017).Haldia,India,2017:17-21. [19]SHI J,LAI J,LI Y,et al.Authorized Keyword Search on Encrypted Data[C]//Proceedings of the 19th European Symposium on Research in Computer Security(ESORICS).Wroclaw Univ Technol,Wroclaw,2014:7-11. [20]WANG H,DONG X,CAO Z.Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search [J].IEEE Transactions on Services Computing,2020,13(6):1142-1151. [21]CHAUDHARI P,DAS M L.KeySea:Keyword-Based SearchWith Receiver Anonymity in Attribute-Based Searchable Encryption [J].IEEE Transactions on Services Computing,2022,15(2):1036-1044. [22]MIAO Y,LIU X,CHOO K K R,et al.Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting [J].IEEE Transactions on Dependable and Secure Computing,2021,18(3):1080-1094. [23]SUN J,XIONG H,NIE X,et al.On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting [J].IEEE Transactions on Dependable and Secure Computing,2021,18(5):2518-2519. [24]LIU Z,CAO Z,WONG D S.Traceable CP-ABE:How to Trace Decryption Devices Found in the Wild [J].IEEE Transactions on Information Forensics and Security,2015,10(1):55-68. [25]HINEK M,JIANG S,SAFAVI-NAINI R,et al.Attribute basedencryption with key cloning protection:Report 2008/478 [R].2008. [26]YU S,REN K,LOU W,et al.Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems[C]//Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks.Athens,GREECE,2009:14-17. [27]KATZ J,SCHRÖDER D.Tracing insider attacks in the context of predicate encryption schemes [C]//Proceedings of the Proc ACITA.2011. [28]LIU Z,CAO Z,WONG D S.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures [J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88. [29]LIU Z,CAO Z,WONG D S.Blackbox traceable CP-ABE:how to catch people leaking their keys by selling decryption devices on ebay[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security.2013. [30]LIU Z,WONG D S.Traceable CP-ABE on prime order groups:Fully secure and fully collusion-resistant blackbox traceable[C]//Proceedings of the International Conference on Information and Communications Security.Springer,2015. [31]ZIEGLER D,MARSALEK A,PALFINGER G.White-BoxTraceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption [C]//Proceedings of the 20th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(IEEE TrustCom).Shenyang,2021:20-22. [32]LUO F,AL-KUWARI S.Generic Construction of Black-BoxTraceable Attribute-Based Encryption [J].IEEE Transactions on Cloud Computing,2023,11(1):942-955. [33]YANG Y,LIU X,DENG R H,et al.Lightweight Sharable andTraceable Secure Mobile Health System [J].IEEE Transactions on Dependable and Secure Computing,2020,17(1):78-91. [34]VARRI U S,KASANI S,PASUPULETI S K,et al.FELT-ABKS:Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data [J].IEEE Internet of Things Journal,2022,9(10):7559-71. [35]LI L,ZHU J,YANG C.Overview of Research on the Revocable Mechanism of Attribute-Based Encryption [J].Netinfo Security,2023(4):39-50. [36]PIRRETTI M,TRAYNOR P,MCDANIEL P,et al.Secure attribute-based systems [C]//Proceedings of the 13th ACM conference on Computer and Communications Security.2006. [37]OSTROVSKY R,SAHAI A,WATERS B.Attribute-Based Encryption with Non-Monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Communication Security.Alexandria,VA,2007:29. [38]ATTRAPADUNG N,IMAI H.Conjunctive Broadcast and Attribute-Based Encryption[C]//Proceedings of the 3rd International Conference on Paring-Based Cryptography.Stanford Univ,Palo Alto,CA,2009:12-14. [39]WANG S,ZHANG X,ZHANG Y.Efficient revocable andgrantable attribute-based encryption from lattices with fine-grained access control [J].IET Information Security,2018,12(2):141-149. [40]TU S,WAQAS M,HUANG F,et al.A revocable and out-sourced multi-authority attribute-based encryption scheme in fog computing [J].Computer Networks,2021,195. [41]DONG X,ZHANG Y,WANG B,et al.Server-Aided Revocable Attribute-Based Encryption from Lattices [J].Security and Communication Networks,2020. [42]WEI J,CHEN X,HUANG X,et al.RS-HABE:Revocable-Stora-ge and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud [J].IEEE Transactions on Dependable and Secure Computing,2021,18(5):2301-2315. [43]BAO Y,QIU W,TANG P,et al.Efficient,Revocable,and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System [J].IEEE Journal of Biomedical and Health Informatics,2022,26(5):2041-2051. [44]MIAO Y,LI F,LI X H,et al.Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud [J].IEEE Transactions on Mobile Computing,2024,23(5):3650-3665. [45]LIU S,YU J,XIAO Y,et al.BC-SABE:Blockchain-AidedSearchable Attribute-Based Encryption for Cloud-IoT [J].IEEE Internet of Things Journal,2020,7(9):7851-7867. [46]LIU S,CHEN L,WU G,et al.Blockchain-Backed SearchableProxy Signcryption for Cloud Personal Health Records [J].IEEE Transactions on Services Computing,2023,16(5):3210-3223. [47]YU J,LIU S,XU M,et al.An Efficient Revocable and Searchable MA-ABE Scheme With Blockchain Assistance for C-IoT [J].IEEE Internet of Things Journal,2023,10(3):2754-2766. [48]MIAO Y,MA J,LIU X,et al.Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing [J].IEEE Internet of Things Journal,2018,5(4):3008-3018. [49]ZHANG K,LONG J,WANG X,et al.Lightweight SearchableEncryption Protocol for Industrial Internet of Things [J].IEEE Transactions on Industrial Informatics,2021,17(6):4248-4259. [50]WANG H,FAN K,ZHANG K,et al.Secure and efficient data-privacy-preserving scheme for mobile cyber-physical systems [J].IEEE Internet of Things Journal,2022,9(22):22375-22388. [51]GAO H,HUANG H,XUE L,et al.Blockchain-enabled fine-grained searchable encryption with cloud-edge computing for electronic health records sharing [J].IEEE Internet of Things Journal,2023,10(20):18414-18425. [52]LIU J,FAN Y,SUN R,et al.Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system [J].IEEE Internet of Things Journal,2023,10(24):21377-21388. [53]NIU S,HU Y,ZHOU S,et al.Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices [J].Ieee Systems Journal,2023,17(3):3503-3514. [54]CUI H,WAN Z,DENG R H,et al.Efficient and ExpressiveKeyword Search Over Encrypted Data in Cloud [J].IEEE Transactions on Dependable and Secure Computing,2018,15(3):409-422. [55]YU Y,SHI J,LI H,et al.Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments [J].IEEE Journal on Selected Areas in Communications,2020,38(6):1242-1251. [56]SHI J,YU Y,YU Q,et al.Toward Data Security in 6G Networks:A Public-Key Searchable Encryption Approach [J].IEEE Network,2022,36(4):166-713. [57]ZHANG D,WANG S,ZHANG Q,et al.Attribute-based conjunctive keywords search with verifiability and fair payment using blockchain [J]. IEEE Transactions on Services Computing,2023,16(6): 4168-4182. [59]MIAO Y,DENG R H,LIU X,et al.Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data [J].IEEE Transactions on Dependable and Secure Computing,2021,18(4):1667-1680. [60]ZHANG P,CHUI Y,LIU H,et al.Efficient and Privacy-Preserving Search Over Edge-Cloud Collaborative Entity in IoT [J].IEEE Internet of Things Journal,2023,10(4):3192-3205. [61]LIU X,YANG X,LUO Y,et al.Verifiable Multikeyword Search Encryption Scheme With Anonymous Key Generation for Medical Internet of Things [J].IEEE Internet of Things Journal,2022,9(22):22315-22326. [62]BAO Y,QIU W,CHENG X.Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System [J].IEEE Internet of Things Journal,2022,9(4):2513-2526. [63]WANG J,LIN X,WU Y,et al.Blockchain-Enabled LightweightFine-Grained Searchable Knowledge Sharing for Intelligent IoT [J].IEEE Internet of Things Journal,2023:1-. [64]EVEN S,GOLDREICH O,MICALI S.On-line/off-line digitalsignatures [J].Journal of Cryptology,1996,9(1):35-67. [65]HOHENBERGER S,WATERS B.Online/Offline Attribute-Based Encryption[C]//Proceedings of the 17th Annual IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC).Buenos Aires,ARGENTINA,2014:26-28. [66]DATTA P,DUTTA R,MUKHOPADHYAY S.Fully Secure Online/Offline Predicate and Attribute-Based Encryption[C]//Proceedings of the 11th International Conference on Information Security Practice and Experience(ISPEC).Beijing,China,2015:5-8. [67]LIU Y,ZHANG Y,LING J,et al.Secure and fine-grained access control on e-healthcare records in mobile cloud computing [J].Future Generation Computer Systems-the International Journal of Escience,2018,78:1020-12206. [68]CUI J,ZHOU H,XU Y,et al.OOABKS:Online/offline attri-bute-based encryption for keyword search in mobile cloud [J].Information Sciences,2019,489:63-77. [69]LIU J,LI Y,SUN R,et al.EMK-ABSE:Efficient MultikeywordAttribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination [J].IEEE Internet of Things Journal,2022,9(19):18650-18662. [70]WANG B,LI M,WANG H.Geometric Range Search on En-crypted Spatial Data [J].IEEE Transactions on Information Forensics and Security,2016,11(4):704-719. [71]XIA Z,WANG X,SUN X,et al.A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352. [72]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006. [73]CASH D,JARECKI S,JUTLA C,et al.Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries[C]//Proceedings of the 33rd Annual International Cryptology Conference(CRYPTO).Santa Barbara,CA,2013:18-22. [74]ZHANG K,WEN M,LU R,et al.Multi-client sub-linear Boolean keyword searching for encrypted cloud storage with owner-enforced authorization [J] IEEE Transactions on Dependable and Secure Computing,2021,18(6):2875-2887. [75]YIN H,QIN Z,ZHANG J,et al.A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing [J].Journal of Parallel and Distributed Computing,2020,135:56-69. [76]YIN H,LI Y,DENG H,et al.Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data [J].Ieee Transactions on Services Computing,2023,16(4):2855-2867. [77]MIAO Y,MA J,LIU X,et al.Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing [J].IEEE Transactions on Services Computing,2020,13(6):985-998. [78]GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data [C]//Applied Cryptography and Network Security.2004:31-45. [79]PARK D J,KIM K,LEE P J.Public key encryption with conjunctive field keyword search [C]//Information Security Applications.2005:73-86. [80]ZHANG K,WANG X,NING J,et al.Multi-client Boolean file retrieval with adaptable authorization switching for secure cloud search services [J].IEEE Transactions on Dependable and Secure Computing,2023,20(6):4621-4636. [81]HE K,GUO J,WENG J,et al.Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data [J].IEEE Transactions on Dependable and Secure Computing,2020,17(6):1207-1217. [82]HUANG Q,YAN G,WEI Q.Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing [J].IEEE Transactions on Services Computing,2023,16(2):957-968. [83]SHAMIR A.How to share a secret [J].Communications of the ACM,1979,22(11):612-613. [84]CHEUNG L,NEWPORT C.Provably Secure Ciphertext Policy ABE[C]//Proceedings of the 14th ACM Conference on Computer and Communication Security.Alexandria,2007. [85]CHEN Y.Research on Attribute-Based Encryption Systems and Its Applications [D].Nanjing:Nanjing University of Posts and Telecommunications,2014. [86]LAI J,DENG R H,YANG Y,et al.Adaptable ciphertext-policy attribute-based encryption [C]//Proceedings of the Pairing-Based Cryptography-Pairing 2013:6th International Conference.Beijing,China,2013:22-24. [87]XUE K,HONG J,XUE Y,et al.CABE:A New Comparable At-tribute-Based Encryption Construction with 0-Encoding and 1-Encoding [J].IEEEE Transactions on Computers,2017,66(9):1491-1503. [88]ZHANG K,WANG X,NING J,et al.Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control [J].IEEE Transactions on Information Forensics and Security,2023,18:5286-5301. [89]LEWKO A,WATERS B.Unbounded HIBE and Attribute-Based Encryption[C]//Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tallinn,ESTONIA,2011:15-19. [90]ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption [C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer C Sommunications Scurity.2013. [91]ZHANG T,LIN W,WANG Y,et al.The design of information security protection framework to support smart grid[C]//Proceedings of the 2010 International Conference on Power System Technology.IEEE,2010. [92]ROGERS K M,KLUMP R,KHURANA H,et al.An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid [J].IEEE Transactions on Smart Grid,2010,1(1):40-47. [93]SU Q,ZHANG R,XUE R,et al.Distributed Attribute-Based SignatureWith Attribute Dynamic Update for Smart Grid [J].IEEE Transactions on Industrial Informatics,2023,19(9):9424-9435. [94]GE J,WEN M,WANG L,et al.Attribute-Based CollaborativeAccess Control Scheme with Constant Ciphertext Length for Smart Grid[C]//Proceedings of the IEEE International Conference on Communications(ICC).Seoul,SOUTH KOREA,2022:16-20. [95]LI J,NIU X,SUN J S,et al.A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data[C]//Proceedings of the IEEE International Conference on Communications(IEEE ICC).2019. [96]ELTAYIEB N,ELHABOB R,HASSAN A,et al.An efficient a-ttribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid [J].Journal of Systems Architecture,2019,98:165-172. [97]GE X,YU J,HAO R,et al.Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System [J].IEEE Transactions on Industrial Informatics,2022,18(8):5573-5583. [98]MAMTA,GUPTA B B,LI K C,et al.Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System [J].IEEE-CAA Journal of Automatica Sinica,2021,8(12):1877-1890. [99]WANG W,XU P,LIU D,et al.Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices [J].IEEE Transactions on Industrial Informatics,2020,16(6):4221-4230. [100]ALI M,SADEGHI M R,LIU X,et al.Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things [J].Journal of Information Security and Applications,2022,65(C):103101. [101]ZHOU R,ZHANG X,WANG X,et al.Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT [J].IEEE Internet of Things Journal,2022,9(18):17098-17109. [102]YIN H,ZHANG W,DENG H,et al.An Attribute-BasedSearchable Encryption Scheme for Cloud-Assisted IIoT [J].IEEE Internet of Things Journal,2023,10(12):11014-11023. |
[1] | LI Zhi, LIN Sen, ZHANG Qiang. Edge Cloud Computing Approach for Intelligent Fault Detection in Rail Transit [J]. Computer Science, 2024, 51(9): 331-337. |
[2] | WANG Tian, SHEN Wei, ZHANG Gongxuan, XU Linli, WANG Zhen, YUN Yu. Soft Real-time Cloud Service Request Scheduling and Multiserver System Configuration for ProfitOptimization [J]. Computer Science, 2024, 51(6A): 230900099-10. |
[3] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[4] | SHAO Tong, LI Chuan, XUE Lei, LIU Yang, ZHAO Ning, CHEN Qing. Forward and Backward Secure Dynamic Searchable Encryption Schemes Based on vORAM [J]. Computer Science, 2024, 51(6A): 230500098-9. |
[5] | TANG Xin, DI Nongyu, YANG Hao, LIU Xin. Optimum Proposal to secGear Based on Skiplist [J]. Computer Science, 2024, 51(6A): 230700030-5. |
[6] | LIU Daoqing, HU Hongchao, HUO Shumin. N-variant Architecture for Container Runtime Security Threats [J]. Computer Science, 2024, 51(6): 399-408. |
[7] | HAN Yujie, XU Zhijie, YANG Dingyu, HUANG Bo, GUO Jianmei. CDES:Data-driven Efficiency Evaluation Methodology for Cloud Database [J]. Computer Science, 2024, 51(6): 111-117. |
[8] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
[9] | XU Chengzhi, XU Lei, XU Chungen. Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption [J]. Computer Science, 2024, 51(3): 340-350. |
[10] | CHEN Juan, WANG Yang, WU Zongling, CHEN Peng, ZHANG Fengchun , HAO Junfeng. Cloud-Edge Collaborative Task Transfer and Resource Reallocation Optimization Based on Deep Reinforcement Learning [J]. Computer Science, 2024, 51(11A): 231100170-10. |
[11] | LIU Zhimin, CHEN Jianer. Scheduling Jobs with Multiple Deadlines in Cloud [J]. Computer Science, 2024, 51(11A): 240100120-7. |
[12] | LIU Yuanlong, DAI Hua, LI Zhangchen, ZHOU Qian, YI Xun, YANG Geng. Research on Semantic-aware Ciphertext Rtrieval in Cloud Environments:A Survey [J]. Computer Science, 2024, 51(11): 298-306. |
[13] | WANG Zheng, WANG Jingwei, YIN Xinchun. Attribute-based Sanitizable and Collaborative Data Sharing Scheme in Medical Scenarios [J]. Computer Science, 2024, 51(10): 416-424. |
[14] | ZHAO Yuhao, CHEN Siguang, SU Jian. Privacy-enhanced Federated Learning Algorithm Against Inference Attack [J]. Computer Science, 2023, 50(9): 62-67. |
[15] | LIU Xuanyu, ZHANG Shuai, HUO Shumin, SHANG Ke. Microservice Moving Target Defense Strategy Based on Adaptive Genetic Algorithm [J]. Computer Science, 2023, 50(9): 82-89. |
|