ZHOU Fu-cai, ZHANG Zong-ye, WANG Kai-xuan, LI Yu-xi. Multi-keyword Searchable Encryption Based on Paillier and Private Set Intersection[J]. Journal of Northeastern University Natural Science, 2019, 40(3): 321-326.
[1]董晓蕾,周俊,曹珍富.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120.(Dong Xiao-lei,Zhou Jun,Cao Zhen-fu.Research advances on secure searchable encryption [J].Journal of Computer Research and Development,2017,54(10):2107-2120.) [2]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data [C]// IEEE Symposium on Security and Privacy.Washington D C:IEEE Computer Society,2000:44. [3]Dan B,Crescenzo G D,Ostrovsky R,et al.Public key encryption with keyword search[M].Berlin:Springer,2004:506-522. [4]Goh E J.Secure indexes[EB/OL].(2004-03-16)[2017-12-17].https://eprint.iacr.org/2003/216.pdf. [5]Cao N,Wang C,Li M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel & Distributed Systems,2013,25(1):222-233. [6]Li M,Yu S,Lou W,et al.Toward privacy-assured cloud data services with flexible search functionalities[C]// International Conference on Distributed Computing Systems Workshops.Washington D C:IEEE,2012:466-470. [7]Sun W,Yu S,Lou W,et al.Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J].IEEE Transactions on Parallel and Distributed Systems,2014,27(4):1187-1198. [8]Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security,2011,19(5):895-934. [9]Gentry C.Fully homomorphic encryption using ideal lattices[C]// Proceedings of the Annual ACM Symposium on Theory of Computing.New York:ACM,2009:169-178. [10]Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]// International Conference on Theory and Application of Cryptographic Techniques.Berlin:Springer-Verlag,1999:223-238. [11]Freedman M J,Nissim K,Pinkas B.Efficient private matching and set intersection[C]// Advances in Cryptology-EUROCRYPT 2004.Berlin:Springer,2004:1-19. [12]Kolesnikov V,Matania N,Pinkas B,et al.Practical multi-party private set intersection from symmetric-key techniques[C]// ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2017:1257-1272.