XU Zi-feng, ZHOU Fu-cai, LI Yu-xi, QIN Shi-yue. Searchable Encryption for Graph Data with Adjacency Query[J]. Journal of Northeastern University Natural Science, 2018, 39(8): 1092-1097.
[1]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security and Privacy.Oakland,2000:44-55. [2]Goh E J.Secure indexes[J/OL].[2017-02-04].https://gnunet.org/sites/default/files/secureindex.pdf. [3]Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]// ACM Conference on Computer and Communications Security.Alexandria,2006:79-88. [4]van Liesdonk P,Sedghi S,Doumen J,et al.Computationally efficient searchable symmetric encryption[C]//Workshop on Secure Data Management.Singapore,2010:87-100. [5]Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security.Raleigh,2012:965-976. [6]Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[C]// 2010 Proceedings IEEE INFOCOM.San Diego,2010:1-5. [7]Chuah M,Hu W.Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]// 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW).Minneapolis,2011:273-281. [8]Liu C,Zhu L,Li L,et al.Fuzzy keyword search on encrypted cloud storage data with small index[C]// 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS).Beijing,2011:269-273. [9]Wang C,Ren K,Yu S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[C]// 2012 Proceedings IEEE INFOCOM.Orlando,2012:451-459. [10]Stefanov E,Papamanthou C,Shi E.Practical dynamic searchable encryption with small leakage[C]//NDSS Symposium 2014.San Diego,2014:72-75. [11]Yang Y,Li H,Liu W,et al.Secure dynamic searchable symmetric encryption with constant document update cost[C]// 2014 IEEE Global Communications Conference (GLOBECOM).Austin,2014:775-780. [12]Cash D,Jaeger J,Jarecki S,et al.Dynamic searchable encryption in very-large databases:data structures and implementation[C] //NDSS Symposium 2014.San Diego,2014:23-26. [13]Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption[C]//International Conference on Financial Cryptography and Data Security.Okinawa,2013:258-274. [14]Chai Q,Gong G.Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]//2012 IEEE International Conference on Communications (ICC).Ottawa,2012:917-922. [15]Zheng Q,Xu S,Ateniese G.VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]//2014 Proceedings IEEE INFOCOM.Toronto,2014:522-530. [16]Zhou F,Li Y,Liu A X,et al.Integrity preserving multi-keyword searchable encryption for cloud computing[C]//International Conference on Provable Security 2016.Nanjing,2016:153-172. [17]Alderman J,Janson C,Martin K M,et al.Extended functionality in verifiable searchable encryption[C]//International Conference on Cryptography and Information Security in the Balkans.Koper,2015:187-205. [18]Cash D,Jarecki S,Jutla C,et al.Highly-scalable searchable symmetric encryption with support for boolean queries[M].Berlin:Springer,2013:353-373. [19]Moataz T,Shikfa A.Boolean symmetric searchable encryption[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.Hangzhou,2013:265-276. [20]Ryu E K,Takagi T.Efficient conjunctive keyword-searchable encryption[C]// 21st International Conference on Advanced Information Networking and Applications Workshops.Ontario,2007:409-414.