1. Practical techniques for searches on encrypted data
2. Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the weil pairing. In International conference on the theory and application of cryptology and information security, pages 514–532. Springer, 2001.
3. A secure index resisting keyword privacy leakage from access and search patterns in searchable encryption
4. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
5. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, and Xiaofen Wang. Dual-server public-key encryption with keyword search for secure cloud storage. IEEE transactions on information forensics and security, 11(4):789–798, 2015.