Author:
Du Ruizhong,She Xijie,Li Mingyue,Wang Ziyuan
Publisher
Springer Nature Singapore
Reference18 articles.
1. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)
2. Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 14651482 (2017)
3. Lecture Notes in Computer Science;S Kamara,2017
4. Li, F., Ma, J., Miao, Y., Liu, X., Ning, J., Deng, R.H.: A survey on searchable symmetric encryption. ACM Comput. Surv. 56(5), 1–42 (2023)
5. Li, M., Jia, C., Du, R., Shao, W.: Forward and backward secure searchable encryption scheme supporting conjunctive queries over bipartite graphs. IEEE Trans. Cloud Comput. 11(1), 1091–1102 (2021)