1. Sorting and searching behind the curtain;Baldimtsi,2015
2. Achieving efficient conjunctive keyword searches over encrypted data;Ballard,2005
3. A concrete security treatment of symmetric encryption;Bellare,1997
4. Public key encryption with keyword search;Boneh,2004
5. Privacy-preserving multi-keyword ranked search over encrypted cloud data;Cao;IEEE Trans. Parallel Distrib. Syst.,2014