1. Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., & Fang, L. (2020). Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing, 18(6), 2787–2800.
2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of of CRYPTO (pp. 506–522). Springer.
3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of Pairing (pp. 2–22). Springer.
4. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with conjunctive field keyword search. In Proceedings of WISA (pp. 73–86). Springer.
5. Xu, Lei, Yuan, Xingliang, Zhou, Zhengxiang, Wang, Cong, & Xu, Chungen. (2021). Towards efficient cryptographic data validation service in edge computing. IEEE Transactions on Services Computing, 1, 1.