1. Practical techniques for searches on encrypted data;Song,2000
2. Public key encryption with keyword search;Boneh,2004
3. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data;Camenisch,2009
4. Authorized keyword searches on public key encrypted data with time controlled keyword privacy;Xu;IEEE Trans. Inf. Forensics Secur.,2019
5. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage;Liang;IEEE Trans. Inf. Forensics Secur.,2015