Page 309 - 《软件学报》2021年第10期
P. 309

张明武  等:医疗大数据隐私保护多关键词范围搜索方案                                                      3281


                 [6]    Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. In: Proc. of the EURORYPT 2004. 2004.
                     506522.
                 [7]    Li M, Yu S, Cao N, Lou WJ. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE
                     Int’l Conf. on Distributed Computing Systems (ICDCS). Minneapolis, 2011. 383392.
                 [8]    Yang Y, Liu J, Cai S, Yang S. Fast multi-keyword semantic ranked search in cloud computing. Chinese Journal Computers, 2018,
                     41(6):13461359 (in Chinese with English abstract).
                 [9]    Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the IEEE Symp. on Security and
                     Privacy. 2000. 4455.
                [10]    Curtmola R, Garay J, Kamara S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions. Journal
                     of Computer Security, 2011,19(5):895934.
                [11]    Wang C, Cao N, RenK, et al. Enabling secure and efficient center keyword search over out sourced cloud data. IEEE Trans. on
                     Paralleled Distributed Systems, 2012,23(8):1467 1479.
                [12]    Wang C, Cao  N, Li  J,  et  al. Secure ranked keyword  search over  encrypted  cloud data. In: Proc. of the IEEE Int’l  Conf. on
                     Distributed Computing Systems (ICDCS). Genova, 2010. 253262.
                [13]    Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM. San
                     Diego, 2010. 15.
                [14]    Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. on Parallel
                     and Distributed Systems, 2014,25(1):829837.
                [15]    Li JG, Tian  XX,  Zhou  AY. Privacy preserving  fuzzy  keyword search in database  as  a service paradigm.  Chinese Journal of
                     Computers, 2016,39(2):414428 (in Chinese with English abstract).
                [16]    Yu  CM,  Chen  CY,  Chao  HC. Privacy-preserving  multikey-word similarity search over outsourced  cloud data. IEEE Systems
                     Journal, 2015,99:110.
                [17]    Yang C, Zhang W, Xu J, et al. A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proc. of the Int’l Conf. on
                     Cloud and Service Computing. Shanghai, 2013. 104110.
                [18]    Fu Z, Sun X, Linge N, et al. Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data
                     supporting synonym query. IEEE Trans. on Consumer Electronics, 2014,60(1):164172.
                [19]    Fu  Z, Wu X, Guan C,  et  al.  Toward  efficient  multi-keyword fuzzy search over  encrypted outsourced data with  accuracy
                     improvement. IEEE Trans. on Information Forensics and Security. 2016,11(12):27062716.
                [20]    Li S, Xu MZ. Attribute-based public encryption with keyword search. Chinese Journal of Computers, 2014,37(5):10171024 (in
                     Chinese with English abstract).
                [21]    Xu P, Jin H, Wu QH, et al. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing
                     attack. IEEE Trans. on Computers, 2013,62(11):22662277.
                [22]    Ma M, Hed, Khanmk, et al. Certificate less searchable public key encryption scheme for mobile health care system. Computers &
                     Electrical Engineering, 2017,43:19.
                [23]    Wang T, Au MH, Wu W. An efficient secure channel free searchable encryption scheme with multiple keywords. In: Proc. of the
                     Int’l Conf. on Network and System Security. 2016. 251265.
                [24]    Chen RM, Mu Y, Yang GM, et al. Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. on
                     Information Forensics and Security, 2016,11(4):789798.
                [25]    Jiang P,  Mu Y,  Guo FC,  et  al.  Public  key encryption with authorized  keyword  search.  In: Proc.  of the Australasian Conf.  on
                     Information Security and Privacy. 2016. 170186.
                [26]    Chen RM, Mu Y, Yang GM, et al. Server-aided public key encryption with keyword search. IEEE Trans. on Information Forensics
                     and Security, 2016,11(12):28332842.
                [27]    Li JG, Lin  XN, Zhang YC,  et  al. KSF-OABE:  Outsourced  attribute-based encryption  with keyword  search function for  cloud
                     storage. IEEE Trans. on Services Computing, 2016. [doi: 10.1109/TSC.2016.2542813]
                [28]    Wong KK, Cheung DW, Kao B, Mamoulis N. Secure k-NN computation on encrypted databases. In: Proc. of the 35th SIGMOD
                     Int’l Conf. on Management of Data. New York: ACM, 2009. 139152.
   304   305   306   307   308   309   310   311   312   313   314