JIA Qiang, ZHANG Shuai, ZHOU Fu-cai. A Searchable Encryption Scheme for Encrypted Large Data Sets[J]. Journal of Northeastern University Natural Science, 2019, 40(7): 913-919.
[1]Yu Y,Man H A A,Ateniese G,et al.Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J].IEEE Transactions on Information Forensics & Security,2017,12(4):767-778. [2]Wang Q,He M,Du M,et al.Searchable encryption over feature-rich data[J].IEEE Transactions on Dependable & Secure Computing,2018,12(3):496-510. [3]Hahn F,Kerschbaum F.Searchable encryption with secure and efficient updates:US9740879[P].2014-10-29. [4]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security & Privacy.Berkeley,2000:44-55. [5]Goh E J.Secure indexes[EB/OL].(2003-10-07).http://eprint.iacr.org/2003/216. [6]Chang Y C,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security.Berlin:Springer,2005:442-455. [7]Stefanov E,Papamanthou C,Shi E.Practical dynamic searchable encryption with small leakage[EB/OL].(2013-12-08).https://eprint.iacr.org/2013/832. [8]Cash D,Jarecki S,Jutla C,et al.Highly-scalable searchable symmetric encryption with support for Boolean queries[C]//Advances in Cryptology—CRYPTO 2013.Santa Barbara:Springer,2013:353-373. [9]Kamara S,Moataz T.Boolean searchable symmetric encryption with worst-case sub-linear complexity[C]// International Conference on the Theory and Applications of Cryptographic Techniques.Paris:Springer,2017:94-124. [10]Ali F S,Lu S.Searchable encryption with conjunctive field free keyword search scheme[C]// International Conference on Network & Information Systems for Computers.Wuhan,2017:260-264. [11]Sougou Labs.SougouCS[EB/OL].(2012-10-11).http://www.sogou.com/labs/resource/cs.php. [12]CALO Project.Enron email dataset[EB/OL].(2011-08-21).http://www.cs.cmu.edu/~./enron.