1. Barak B, Goldreich O (2008) Universal arguments and their applications. SIAM J Comput 38(5):1661–1694
2. Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy, pp 44–55
3. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88
4. Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934
5. Goh E (2003) Secure indexes. Cryptology ePrint Archive, Report 2003/216