SONG Chengli, CHEN Zhenhua. Searchable Encryption of Graph Shape Matching in Cloud Computing[J]. Computer Engineering and Applications, 2023, 59(12): 235-241.
[1] SONG D X,WANGER D,PERRING A.Practical techniques for searches on encrypted data[C]//Proceedings of the 21st IEEE Symposium on Security and Privacy,Oakland,May 14-17,2000.Piscataway:IEEE,2000:44-55.
[2] BONEH D,Di C G,OSTROVSKY R,et al.Public key encryption with keyword search[C]//Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques,Interlaken,May 2-6,2004.Berlin,Heidelberg:Springer,2004:506-522.
[3] BAEK J,SADAVI-NAINI R,SUSILO W.Public key encryption with keyword search revisited[C]//Proceedings of the 8th International Conference on Computational Science and Its Applications,Perugia,Jun 30-Jul 3.Berlin,Heidelberg:Springer,2008:1249-1259.
[4] RHEE H S,PARK J H,LEE D H.Generic construction of designated tester public-key encryption with keyword search[J].Information Sciences,2012,205:93-109.
[5] BYUN J W,RHEE H S,PARK H A,et al.Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]//Workshop on Secure Data Management,Seoul,Sept 10-11,2006.Berlin,Heidelberg:Springer,2006:75-83.
[6] YAU W C,HENG S H,GOI B M.Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[C]//Proceedings of the 5th International Conference on Autonomic and Trusted Computing,Oslo,Jun 23-25,2008.Berlin,Heidelberg:Springer,2008:100-105.
[7] RHEE H S,SUSILO W,KIM H J.Secure searchable public key encryption scheme against keyword guessing attacks[J].IEICE Electronics Express,2009,6(5):237-243.
[8] TANG Q,CHEN L Q.Public-key encryption with registered keyword search[C]//Proceedings of the 6th European Public Key Infrastructure Workshop,Pisa,Sept 10-11,2009.Berlin,Heidelberg:Springer,2009:163-178.
[9] RHEE H S,PARK J H,SUSILO W,et al.Trapdoor security in a searchable public-key encryption scheme with a designated tester[J].Journal of Systems and Software,2010,83(5):763-771.
[10] ZHAO Y,CHEN X,MA H,et al.A new trapdoor-indistinguishable public key encryption with keyword search[J].Journal of Wireless Mobile Networks Ubiquitous Comput,and Dependable Applications,2012,3(1/2):72-81.
[11] CHEN R,MU Y,YANG G,et al.Dual-server public-key encryption with keyword search for secure cloud storage[J].IEEE Transactions on Information Forensics and Security,2015,11(4):789-798.
[12] CHEN R,MU Y,YANG G,et al.Server-aided public key encryption with keyword search[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2833-2842.
[13] HUANG Q,LI H.An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J].Information Sciences,2017,403:1-14.
[14] QIN B,CHEN Y,HUANG Q,et al.Public-key authenticated encryption with keyword search revisited:security model and constructions[J].Information Sciences,2020,516:515-528.
[15] CAO N,YANG Z,WANG C,et al.Privacy-preserving query over encrypted graph-structured data in cloud computing[C]//Proceedings of the 31st International Conference on Distributed Computing Systems,Minneapolis,June 20-24,2011.Los Alamitos:IEEE Computer Society,2011:393-402.
[16] ZHANG Y,SU S,WANG Y,et al.Privacy-assured substructure similarity query over encrypted graph-structured data in cloud[J].Security and Communication Networks,2014,7(11):1933-1944.
[17] FAN Z,CHOI B,CHEN Q,et al.Structure-preserving subgraph query services[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(8):2275-2290.
[18] 李顺东,杨晓莉,左祥建,等.保护私有信息的图形相似判定[J].电子学报,2017,45(9):2184-2189.
LI S D,YANG X L,ZUO X J,et al.Privacy-preserving graphical similarity determination[J].Acta Electronica Sinica,2017,45(9):2184-2189.