8SONG D,WAGNER D.PERRIG A.Practical Techniques for Searches on Encrypted Data[C] //Proceedings of the IEEE Symposium on Security and Privacy(S&P'00),May 14-17.2000.Berkeley,CA,USA.Piscataway,NJ,USA:IEEE.2000:44-55.
9BONEH D,CRESCENZO G,OSTROVSKY R.et al.Public Key Encryptlon With Keyword Search[C] //Advances in Cryptology.Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT'04),May 2-6,2004,Interlaken.Switzeriand.LNCS 3027.Berlin,Germany:Springer-Verlag,2004:506-522.
10PARK D,KIM K,LEE P.Public Key Encryption With Conjunctive Field Keyword Search[C] //Proceedings of the 2004 Workshop on Information Security Applications(WISA'04).Oct 29-31,2004,Wuhan,China.LNCS 3325.Berlin.Germany:Springer-Verlag,2004:73-86.