1. CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2016: 79–88.
2. SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2000: 44–55.
3. GOH E J. Secure indexes[J]. IACR cryptology eprint archive, 2003: 216.
4. BLOOM, B H. Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 131(5): 451–459.
5. VAN LIESDONK P, SEDGHI S, DOUMEN J, et al. Computationally efficient searchable symmetric encryption[C]//Proceedings of the 7th VLDB Workshop on Secure Data Management, Singapore, 2010: 87–100.