2BENALOH J, CHASE M, HORVITZ E, et al. Pa- tient controlled encryption: ensuring privacy of elec- tronic medical records [C] // Proceedings of the 2009 ACM workshop on Cloud computing security. New York,USA: ACM, 2009: 103-114.
3THOMPSON B, HABER S, HORNE W G, et al. Privacy-preserving computation and verification of ag- gregate queries on outsourced databases [C]//Pro- ceedings of the 9th International Symposium on Priva- cy Enhancing Technologies. New York, USA:ACM, 2009 : 185-201.
4WANG Weichao, LI Zhiwei, OWENS R, et al. Se- cure and efficient access to outsourced data [C]//Pro- ceedings of the 2009 ACM Workshop on Cloud Com- puting Security. New York, USA: ACM, 2009:55- 66.
5LIU Qin, WANG Guojun, WU Jie. An efficient priva cy preserving keyword search scheme in cloud computing[C] // Proceedings of the 2009 International Con ferenee on Computational Science and Engineering. New York, USA: ACM, 2009: 715-720.
6BONECH D, CRESCENZO D G, OSTROVSKY R, et al. Public-key encryption with keyword search [C] //Proceedings of Eurocrypt 2004. Berlin, Germany: Springer, 2004: 506-522.
7CHANG Yancheng, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data [EB/OL]. [2011-07-06]. http://eprint, iacr. org/ 2004/051. pdf.
8OHTAKI Y. Partial disclosure of searchable encrypted data with support for Boolean queries [C] // Proceed- ings of the 2008 Third International Conference on Availability, Reliability and Security. New York, USA: ACM, 2008:1083-1090.
9BELLOVIN S, CHESWICK W. Privacy-enhanced searches using encrypted bloom filters [EB/OL]. [2011-07-06]. http://citeseerx.ist. psu. edu/viewdoc/ download:jsessionid = FDCF3E4971210ETBF4E2BA-AD9939371C? doi = 10.1.1.58. 6899&rep = rep1&. type= pdf.
10WONG W K, CHEUNG D W, KAO Ben, et al. Se cure kNN computation on encrypted databases[C]// Proceedings of the 35th SIGMOD International Confer ence on Management of Data. New York, USA: ACM, 2009: 189-152.