1. Y.P. Zhang, J. Katz, C. Papamanthou, All your queries are belong to us: the power of file-injection attacks on searchable encryption, in: The 25th USENIX Conference on Security, 2016, pp. 707–720.
2. Towards efficient verifiable forward secure searchable symmetric encryption;Zhang,2019
3. D.X.D. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Symposium on Security and Privacy, 2000, pp. 44–55.
4. Secure indexes;Goh;IACR Cryptol. ePrint Arch.,2003
5. Searchable symmetric encryption: improved definitions and efficient constructions;Curtmola;Comput. Secur.,2011