Page 372 - 《软件学报》2025年第9期
P. 372

蒲浪 等: 基于国密    SM9  的公钥认证可搜索加密方案                                                 4283


                 References:
                  [1]   Chuka-Maduji N, Anu V. Cloud computing security challenges and related defensive measures: A survey and taxonomy. SN Computer
                     Science, 2021, 2(4): 331. [doi: 10.1007/s42979-021-00732-3]
                  [2]   Zhou YH, Li N, Tian YM, An DZ, Wang LC. Public key encryption with keyword search in cloud: A survey. Entropy, 2020, 22(4): 421.
                     [doi: 10.3390/e22040421]
                  [3]   Yau WC, Heng SH, Goi BM. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Proc.
                     of the 5th Int’l Conf. on Autonomic and Trusted Computing (ATC 2008). Oslo: Springer, 2008. 100–105. [doi: 10.1007/978-3-540-69295-
                     9_10]
                  [4]   Jeong IR, Kwon JO, Hong D, Lee DH. Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer
                     Communications, 2009, 32(2): 394–396. [doi: 10.1016/j.comcom.2008.11.018]
                  [5]   Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Symp. on Security and
                     Privacy (S&P 2000). Berkeley: IEEE, 2000. 44–55. [doi: 10.1109/SECPRI.2000.848445]
                  [6]   Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proc. of the 2004 Int’l Conf. on the
                     Theory and Applications of Cryptographic Techniques. Interlaken: Springer, 2004. 506–522. [doi: 10.1007/978-3-540-24676-3_30]
                  [7]   Goh EJ. Secure indexes. 2003. https://eprint.iacr.org/2003/216
                  [8]   Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi HX. Searchable encryption
                     revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Proc. of the 25th Annual Int’l Cryptology Conf. on
                     Advances in Cryptology. Santa Barbara: Springer, 2005. 205–222. [doi: 10.1007/11535218_13]
                  [9]   Byun JW, Rhee HS, Park HA, Lee DH. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In:
                     Proc. of the 3rd VLDB Workshop on Secure Data Management. Seoul: Springer, 2006. 75–83. [doi: 10.1007/11844662_6]
                 [10]   Park DJ, Kim K, Lee PJ. Public key encryption with conjunctive field keyword search. In: Proc. of the 5th Int’l Workshop on Information
                     Security Applications (WISA 2004). Jeju Island: Springer, 2005. 73–86. [doi: 10.1007/978-3-540-31815-6_7]
                 [11]   Tang  Q,  Chen  LQ.  Public-key  encryption  with  registered  keyword  search.  In:  Proc.  of  the  6th  European  Workshop  on  Public  Key
                     Infrastructures, Services and Applications (EuroPKI 2009). Pisa: Springer, 2009. 163–178. [doi: 10.1007/978-3-642-16441-5_11]
                 [12]   Baek  J,  Safavi-Naini  R,  Susilo  W.  Public  key  encryption  with  keyword  search  revisited.  In:  Proc.  of  the  2008  Int’l  Conf.  on  the
                     Computational Science and Its Applications. Perugia: Springer, 2008. 1249–1259. [doi: 10.1007/978-3-540-69839-5_96]
                 [13]   Fang LM, Susilo W, Ge CP, Wang JD. A secure channel free public key encryption with keyword search scheme without random oracle.
                     In: Proc. of the 8th Int’l Conf. on Cryptology and Network Security (CANS 2009). Kanazawa: Springer, 2009. 248–258. [doi: 10.1007/
                     978-3-642-10433-6_16]
                 [14]   Chen RM, Mu Y, Yang GM, Guo FC, Huang XY, Wang XF, Wang YJ. Server-aided public key encryption with keyword search. IEEE
                     Trans. on Information Forensics and Security, 2016, 11(12): 2833–2842. [doi: 10.1109/TIFS.2016.2599293]
                 [15]   Huang Q, Li HB. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information
                     Sciences, 2017, 403–404: 1–14. [doi: 10.1016/j.ins.2017.03.038]
                 [16]   Chen BW, Wu LB, Zeadally S, He DB. Dual-server public-key authenticated encryption with keyword search. IEEE Trans. on Cloud
                     Computing, 2022, 10(1): 322–333. [doi: 10.1109/TCC.2019.2945714]
                 [17]   Qin BD, Chen Y, Huang Q, Liu XM, Zheng D. Public-key authenticated encryption with keyword search revisited: Security model and
                     constructions. Information Sciences, 2020, 516: 515–528. [doi: 10.1016/j.ins.2019.12.063]
                 [18]   Li HB, Huang Q, Huang JY, Susilo W. Public-key authenticated encryption with keyword search supporting constant trapdoor generation
                     and fast search. IEEE Trans. on Information Forensics and Security, 2023, 18: 396–410. [doi: 10.1109/TIFS.2022.3224308]
                 [19]   Liu  XG,  Sun  YY,  Dong  H.  A  pairing-free  certificateless  searchable  public  key  encryption  scheme  for  IoMT.  Journal  of  Systems
                     Architecture, 2023, 139: 102885. [doi: 10.1016/j.sysarc.2023.102885]
                 [20]   Cheng LX, Meng F. Public key authenticated searchable encryption against frequency analysis attacks. Information Sciences, 2023, 640:
                     119060. [doi: 10.1016/j.ins.2023.119060]
                 [21]   Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proc. of the 4th Theory of Cryptography Conf. (TCC
                     2007). Amsterdam: Springer, 2007. 535–554. [doi: 10.1007/978-3-540-70936-7_29]
                 [22]   Shi E, Bethencourt J, Chan THH, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proc. of the 2007 IEEE
                     Symp. on Security and Privacy (S&P 2007). Berkeley: IEEE, 2007. 350–364. [doi: 10.1109/SP.2007.29]
                 [23]   Xu P, Jin H, Wu QH, Wang W. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing
                     attack. IEEE Trans. on Computers, 2013, 62(11): 2266–2277. [doi: 10.1109/TC.2012.215]
                 [24]   Li S, Xu MZ. Attribute-based public encryption with keyword search. Chinese Journal of Computers, 2014, 37(5): 1017–1024 (in Chinese
                     with English abstract). [doi: 10.3724/SP.J.1016.2014.01017]
                 [25]   Chen BW, Xiang T, He DB, Li HW, Choo KKR. BPVSE: Publicly verifiable searchable encryption for cloud-assisted electronic health
                     records. IEEE Trans. on Information Forensics and Security, 2023, 18: 3171–3184. [doi: 10.1109/TIFS.2023.3275750]
   367   368   369   370   371   372   373   374   375   376   377