1. Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. Crypto, Springer 3621:205–222
2. AlZain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using shamir’s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput (IJCAC) 5(3):35–52
3. Arriaga A, Tang Q, Ryan P (2014) Trapdoor privacy in asymmetric searchable encryption schemes. In: International conference on cryptology in Africa, Springer, pp 31–50
4. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt, Springer 3027:506–522
5. Bost R (2016) o
$$\varphi $$
φ
o
$$\varsigma $$
ς
: forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1143–1154