1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H., 2005. Encryption with keyword search, revisited: consistency conditions, relations to anonymous IBE, and extensions. In: Proceedings of Crypto’05, LNCS, vol. 3621. Springer-Verlag, pp. 205–222.
2. Baek, J., Safavi-Naini, R., Susilo, W., 2008. Public key encryption with keyword search revisited. In: Proceedings of Computational Science and Its Applications, ICCSA 2008, LNCS, vol. 5072. Springer-Verlag, pp. 1249–1259.
3. Space/time trade-offs in hash coding with allowable errors;Bloom;Communications of the ACM,1970
4. Conjuctive, subset and range queries on encrypted data;Boneh,2007
5. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G., 2004. Public key encryption with keyword search. In: Proceedings of Eurocrypt’04, LNCS, vol. 3089. Springer-Verlag, pp. 31–45.