1Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445].
2Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0].
3Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958].
5Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30].
6Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88.
7Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7].
8Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298].
9Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption.In:Sadeghi AR,ed.Proc.of the Financial Cryptography and Data Security.LNCS 7859,Berlin:Springer-Verlag,2013.258-274.[doi:10.1007/978-3-642-39884-122].
10Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data.In:Jakobsson Mj Yung M,Zhou J,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3089,Berlin:Springer-Verlag,2004.31-45.[doi:10.1007/978-3-540-24852-1一3].