Page 372 - 《软件学报》2025年第9期
P. 372
蒲浪 等: 基于国密 SM9 的公钥认证可搜索加密方案 4283
References:
[1] Chuka-Maduji N, Anu V. Cloud computing security challenges and related defensive measures: A survey and taxonomy. SN Computer
Science, 2021, 2(4): 331. [doi: 10.1007/s42979-021-00732-3]
[2] Zhou YH, Li N, Tian YM, An DZ, Wang LC. Public key encryption with keyword search in cloud: A survey. Entropy, 2020, 22(4): 421.
[doi: 10.3390/e22040421]
[3] Yau WC, Heng SH, Goi BM. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Proc.
of the 5th Int’l Conf. on Autonomic and Trusted Computing (ATC 2008). Oslo: Springer, 2008. 100–105. [doi: 10.1007/978-3-540-69295-
9_10]
[4] Jeong IR, Kwon JO, Hong D, Lee DH. Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer
Communications, 2009, 32(2): 394–396. [doi: 10.1016/j.comcom.2008.11.018]
[5] Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Symp. on Security and
Privacy (S&P 2000). Berkeley: IEEE, 2000. 44–55. [doi: 10.1109/SECPRI.2000.848445]
[6] Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proc. of the 2004 Int’l Conf. on the
Theory and Applications of Cryptographic Techniques. Interlaken: Springer, 2004. 506–522. [doi: 10.1007/978-3-540-24676-3_30]
[7] Goh EJ. Secure indexes. 2003. https://eprint.iacr.org/2003/216
[8] Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi HX. Searchable encryption
revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Proc. of the 25th Annual Int’l Cryptology Conf. on
Advances in Cryptology. Santa Barbara: Springer, 2005. 205–222. [doi: 10.1007/11535218_13]
[9] Byun JW, Rhee HS, Park HA, Lee DH. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In:
Proc. of the 3rd VLDB Workshop on Secure Data Management. Seoul: Springer, 2006. 75–83. [doi: 10.1007/11844662_6]
[10] Park DJ, Kim K, Lee PJ. Public key encryption with conjunctive field keyword search. In: Proc. of the 5th Int’l Workshop on Information
Security Applications (WISA 2004). Jeju Island: Springer, 2005. 73–86. [doi: 10.1007/978-3-540-31815-6_7]
[11] Tang Q, Chen LQ. Public-key encryption with registered keyword search. In: Proc. of the 6th European Workshop on Public Key
Infrastructures, Services and Applications (EuroPKI 2009). Pisa: Springer, 2009. 163–178. [doi: 10.1007/978-3-642-16441-5_11]
[12] Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In: Proc. of the 2008 Int’l Conf. on the
Computational Science and Its Applications. Perugia: Springer, 2008. 1249–1259. [doi: 10.1007/978-3-540-69839-5_96]
[13] Fang LM, Susilo W, Ge CP, Wang JD. A secure channel free public key encryption with keyword search scheme without random oracle.
In: Proc. of the 8th Int’l Conf. on Cryptology and Network Security (CANS 2009). Kanazawa: Springer, 2009. 248–258. [doi: 10.1007/
978-3-642-10433-6_16]
[14] Chen RM, Mu Y, Yang GM, Guo FC, Huang XY, Wang XF, Wang YJ. Server-aided public key encryption with keyword search. IEEE
Trans. on Information Forensics and Security, 2016, 11(12): 2833–2842. [doi: 10.1109/TIFS.2016.2599293]
[15] Huang Q, Li HB. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information
Sciences, 2017, 403–404: 1–14. [doi: 10.1016/j.ins.2017.03.038]
[16] Chen BW, Wu LB, Zeadally S, He DB. Dual-server public-key authenticated encryption with keyword search. IEEE Trans. on Cloud
Computing, 2022, 10(1): 322–333. [doi: 10.1109/TCC.2019.2945714]
[17] Qin BD, Chen Y, Huang Q, Liu XM, Zheng D. Public-key authenticated encryption with keyword search revisited: Security model and
constructions. Information Sciences, 2020, 516: 515–528. [doi: 10.1016/j.ins.2019.12.063]
[18] Li HB, Huang Q, Huang JY, Susilo W. Public-key authenticated encryption with keyword search supporting constant trapdoor generation
and fast search. IEEE Trans. on Information Forensics and Security, 2023, 18: 396–410. [doi: 10.1109/TIFS.2022.3224308]
[19] Liu XG, Sun YY, Dong H. A pairing-free certificateless searchable public key encryption scheme for IoMT. Journal of Systems
Architecture, 2023, 139: 102885. [doi: 10.1016/j.sysarc.2023.102885]
[20] Cheng LX, Meng F. Public key authenticated searchable encryption against frequency analysis attacks. Information Sciences, 2023, 640:
119060. [doi: 10.1016/j.ins.2023.119060]
[21] Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proc. of the 4th Theory of Cryptography Conf. (TCC
2007). Amsterdam: Springer, 2007. 535–554. [doi: 10.1007/978-3-540-70936-7_29]
[22] Shi E, Bethencourt J, Chan THH, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proc. of the 2007 IEEE
Symp. on Security and Privacy (S&P 2007). Berkeley: IEEE, 2007. 350–364. [doi: 10.1109/SP.2007.29]
[23] Xu P, Jin H, Wu QH, Wang W. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing
attack. IEEE Trans. on Computers, 2013, 62(11): 2266–2277. [doi: 10.1109/TC.2012.215]
[24] Li S, Xu MZ. Attribute-based public encryption with keyword search. Chinese Journal of Computers, 2014, 37(5): 1017–1024 (in Chinese
with English abstract). [doi: 10.3724/SP.J.1016.2014.01017]
[25] Chen BW, Xiang T, He DB, Li HW, Choo KKR. BPVSE: Publicly verifiable searchable encryption for cloud-assisted electronic health
records. IEEE Trans. on Information Forensics and Security, 2023, 18: 3171–3184. [doi: 10.1109/TIFS.2023.3275750]

