[1] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//Proceeding IEEE Symposium on Security and Privacy, 2000: 44-55.
[2] 高丽萍, 程添, 高丽. 区块链环境下基于细粒度授权隐私保护的空间众包任务分配模型[J]. 小型微型计算机系统, 2022, 43(4): 759-766.
GAO L P, CHENG T, GAO L. Blockchain-based task allocation model on fine-grained privacy-preserving in spatial crowsourcing[J]. Journal of Chinese Computer Systems, 2022, 43(4): 759-766.
[3] SHU J, YANG K, JIA X, et al. Proxy-free privacy-preserving task matching with efficient revocation in crowd sourcing[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 18(1): 117-130.
[4] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 25(1): 222-233.
[5] LI J, WANG Q, WANG C, et al. Fuzzy keyword search over encrypted data in cloud computing[C]//Proceedings IEEE INFOCOM, 2010: 1-5.
[6] VAANCHIG N, QIN Z, QIN Z. Public key encryption with temporary and fuzzy keyword search[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 3914-3935.
[7] WANG B, FU S, ZHANG X, et al. Reliable and privacy-preserving task matching in blockchain-based crowd sourcing[C]//Proceedings of the 30th ACM International Conference on Information & Knowledge Management, 2021: 1879-1888.
[8] 王恺璇, 李宇溪, 周福才, 等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017, 54(2): 348-360.
WANG K X, LI Y X, ZHOU F C, et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
[9] 刘雪艳, 芦婷婷, 杨晓涛. 具有隐私保护的完整性可验证的关键字搜索方案[J]. 电子与信息学报, 2021, 43(1): 218-225.
LIU X Y, LU T T, YANG X T. Verifiable atribute-based keyword search scheme with privacy preservation[J]. Journal of Electronics and Information Technology, 2021, 43(1): 218-225.
[10] DU J, ZHOU J, LIN Y, et al. Secure and verifiable keyword search in multiple clouds[J]. IEEE Systems Journal, 2022, 16(2): 2660-2671.
[11] NAJAFI A, JAVADI H H S, BAYAT M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security[J]. Multimedia Tools and Applications, 2021, 80(17): 26049-26068.
[12] 闫玺玺, 原笑含, 汤永利, 等. 基于区块链且支持验证的属性 基搜索加密方案[J]. 通信学报, 2020, 41(2): 187-198.
YAN X X, YUAN X H, TANG Y L, et al. Verifiable attribute-based searchable encryption scheme based on blockchain[J]. Journal on Communications, 2020, 41(2): 187-198.
[13] GUO Y, ZHANG C, JIA X. Verifiable and forward-secure enc rypted search using blockchain techniques[C]//2020 IEEE International Conference on Communications (ICC), 2020: 1-7.
[14] CAI C, WENG J, YUAN X, et al. Enabling reliable keywor d search in encrypted decentralized storage with fairn ess[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 18(1): 131-144.
[15] 聂梦飞, 庞晓琼, 陈文俊, 等. 基于以太坊区块链的公平可搜 索加密方案[J]. 计算机工程与应用, 2020, 56(4): 69-75.
NIE M F, PANG X Q, CHEN W J, et al. Fair searchable encryption scheme based on ethereum blockchain[J]. Computer Engineering and Applications, 2020, 56(4): 69-75.
[16] HOZHABR M, ASGHARI P, JAVADI H H S. Dynamic secure multi-keyword ranked search over encrypted cloud data[J]. Journal of Information Security and Applications, 2021, 61: 102902.
[17] LIANG Y, LI Y, ZHANG K, et al. DMSE: dynamic multi-key word search encryption based on inverted index[J]. Journal of Systems Architecture, 2021, 119: 102255.
[18] LIU Q, PENG Y, WU J, et al. Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing[J]. IEEE Transactions on Network and Service Management, 2020, 18(2): 2046-2062.
[19] LIU G, YANG G, BAI S, et al. FSSE: an effective fuzzy semantic searchable encryption scheme over encrypted cloud data[J]. IEEE Access, 2020, 8: 71 893-71906.
[20] MIAO Y, DENG R H, CHOO K K R, et al. Optimized verifiable fine-grained keyword search in dynamic multi-owner settings[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(4): 1804-1820.
[21] LI F, MA J, MIAO Y, et al. Verifiable and dynamic multi- keyword search over encrypted cloud data using bitmap[J]. IEEE Transactions on Cloud Computing, 2023, 11(1): 336-348.
[22] GE X, YU J, CHEN F, et al. Toward verifiable phrase searc over encrypted cloud-based IoT data[J]. IEEE Internet of Things Journal, 2021, 8(16): 12902-12918.
[23] LIU X, YANG X, LUO Y, et al. Verifiable multikeyword search encryption scheme with anonymous key generation for medical Internet of things[J]. IEEE Internet of Things Journal, 2022, 9(22): 22315-22326.
[24] LI H, TIAN H, ZHANG F, et al. Blockchain-based searchable symmetric encryption scheme[J]. Computers & Electrical Engineering, 2019, 73: 32-45.
[25] YANG Y, LIN H, LIU X, et al. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment[J]. IEEE Access, 2019, 7: 140818-140832.
[26] 李燕, 马海英, 王占君. 区块链关键技术的研究进展[J]. 计算机工程与应用, 2019, 55(20): 13-23.
LI Y, MA H Y, WANG Z J. Research progress on key technologies of blockchain[J]. Computer Engineering and Applications, 2019, 55(20): 13-23.
[27] WOOD G. Ethereum: a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014, 151(2014): 1-32.
[28] CHRISTIDIS K, DEVETSIKIOTIS M. Blockchains and smart contracts for the internet of things[J]. IEEE Access, 2016, 4: 2292-2303.
[29] INDYK P, MOTWANI R. Approximate nearest neighbors: towards removing the curse of dimensionality[C]//Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, 1998: 604-613. |