The Journal of China Universities of Posts and Telecommunications ›› 2023, Vol. 30 ›› Issue (2): 83-95.doi: 10.19682/j.cnki.10058885.2022.0023
• Security • Previous Articles Next Articles
Zhou Yousheng, Huang Miao, Liu Yuanni, Chen Zigang
Received:2021-12-20
Revised:2022-06-23
Online:2023-04-30
Published:2023-04-27
Contact:
You-Sheng YouZHOU
E-mail:zhouys@cqupt.edu.cn
Add to citation manager EndNote|Ris|BibTeX
URL: https://jcupt.bupt.edu.cn/EN/10.19682/j.cnki.10058885.2022.0023
| [1] YANG S, LIU H S, CHENG Y. Overview of design and implementation of cloud computing security system. Journal of Chongqing University of Posts and Telecommunications ( Natural Science Edition), 2020, 32(5): 816 -824 (in Chinese). [2] CHEN Y L, YANG H S. CP-ABE based searchable encryption with attribute revocation. Journal of Chongqing University of Posts and Telecommunications ( Natural Science Edition ), 2016, 28(4): 545 -554 (in Chinese). [3] BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search. International Conference on the Theory and Applications of Cryptographic Techniques, May 2 -6, 2004, Interlaken, Switzerland. German: Springer, Berlin, Heidelberg, 2004: 506 -522. [4] WANG X, CHEN Y L. Attribute-based searchable encryption scheme from lattices on Ethereum. Journal of Chongqing University of Posts and Telecommunications ( Natural Science Edition), 2021, 33(4): 675 -682 (in Chinese). [5] LI J, WANG Q, WANG C, et al. Fuzzy keyword search over encrypted data in cloud computing. Proceedings of 2010 IEEE Conference on Computer Communication (INFOCOM'10). Mar 14 - 19, 2010, San Diego, CA, USA. Piscataway, NJ, USA: IEEE, 2010: 1 -5. [6] YANG Y, LIN H R, LIU X M, et al. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access, 2019, 7: 140818 -140832. [7] YANG Y, Ma M D. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Transactions on Information Forensics and Security, 2015, 11(4): 746 -759. [8] GUO C, CHEN X, JIE Y M, et al. Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption. IEEE Transactions on Services Computing, 2017, 13(6): 1034 - 1044. [9] WANG C, CAO N, LI J, et al. Proceedings of the secure ranked keyword search over encrypted cloud data. Proceeding of the 30th IEEE International Conference on Distributed Computing Systems, June 21 -25, 2010, Genoa, Italy. Piscataway, NJ, USA: IEEE, 2010: 253 -262. [10] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2013, 25(1): 222 -233. [11] CHEN J, HE K, DENG L, et al. EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Transactions on Services Computing, 2017, 13(6): 1072 -1085. [12] KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic searchable symmetric encryption. Proceedings of the 2012 ACM Conference on Computer and Communications Security, Oct 16 -18, 2012 Raleigh, North Carolina, USA. New York, NY: ACM, 2012: 965 -976. [13] GUO C, ZHUANG R H, CHANG C C, et al. Dynamic multi- keyword ranked search based on Bloom filter over encrypted cloud data. IEEE Access, 2019, 7: 35826 -35837. [14] YAN J B, ZHANG Y Q, LIU X F. Secure multi-keyword search supporting dynamic update and ranked retrieval. China Communications, 2016, 13(10): 209 -221. [15] WONG W K, CHEUNG D W, KAO B, et al. Secure KNN computation on encrypted databases. Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, Jun 29 - Jul 2, 2009, Rhode Island, USA. New York, NY: ACM, 2009: 139 -152. [16] YAO B, LI F F, XIAO X K. Secure nearest neighbor revisited. Proceeding of the 29th IEEE International Conference on Data Engineering ( ICDE'13), Apr 8 - 12, 2013, Brisbane, QLD, Australia. Piscataway, NJ, USA: IEEE, 2013: 733 -744. [17] LI J Y, MA J F, MIAO Y B, et al. Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Transactions on Cloud Computing, 2020, Early Access Arlicle, doi: 10. 1109/ TCC. 2020. 3024226. [18] WANG B, YU S C, LOU W J, et al. Privacy-preserving multi- keyword fuzzy search over encrypted data in the cloud. Proceedings of the IEEE 2014 Conference on Computer Communications (INFOCOM'14), Apr 27 - May 2, 2014, Toronto, ON, Canada. Piscataway, NJ, USA: IEEE, 2014: 2112 -2120. [19] DATAR M, IMMORLICA N, INDYK P, et al. Locality-sensitive Hashing scheme based on P-stable distributions. Proceedings of the 12th Annual Symposium on Computational Geometry, Jun 8 - 11, 2004, Brooklyn, New York, USA. New York, NY: ACM, 2004: 253 -262. |
| [1] | . Dynamic coverage of mobile multi-target in sensor networks based on virtual force [J]. The Journal of China Universities of Posts and Telecommunications, 2024, 31(4): 83-94. |
| [2] | . Energy-efficient reconfigurable processor for QC-LDPC via adaptive coding-voltage-frequency tuning [J]. The Journal of China Universities of Posts and Telecommunications, 2024, 31(2): 72-84. |
| [3] | Zhang Xiaojiao, Wu Xiang. Distributed consensus of Lurie multi-agent systems under directed topology: a contraction approach [J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(6): 11-21. |
| [4] | Wu Yue, Chen Xiangyong, Qiu Jianlong, Hu Shunwei, Zhao Feng. Dynamic event-triggered leader-follower consensus of nonlinear multi-agent systems under directed weighted topology [J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(6): 3-10. |
| [5] | Wang Zixian, Zhang Miao, Yan Danfeng . DRO-SLAM: Real-time object-aware SLAM for navigation robots and autonomous driving in dynamic environments [J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(3): 14-24. |
| [6] | Li Qinghua, Wang Jiahui, Li Haiming, Feng Chao. HQD-RRT*: a high-quality path planner for mobile robot in dynamic environment [J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(3): 69-80. |
| [7] | Sun Heng, Qiao Xiuquan. Augmented reality-based BIM multi-user collaboration system [J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(1): 71-80. |
| [8] | Quan Yixuan, Zheng Jiali, Xie Xiaode, Lin Zihan, Luo Wencong. Hybrid gray wolf optimization-cuckoo search algorithm for RFID network planning [J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(6): 91-102. |
| [9] |
崔岩松 白春雨.
Dynamic load balancing algorithm for distributed system [J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(5): 91-101. |
| [10] | Xie Renchao, Liu Xu, Duan Xuefei, Tang Qinqin, Yu Fei Richard, Huang Tao. Dynamic computation offloading in time-varying environment for ultra-dense networks: a stochastic game approach [J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(2): 24-37. |
| [11] | Guan Hao, Rao Yongsheng, Xu Zhangtao. Design and implementation of web-based dynamic geometry drawing technology [J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(6): 43-53. |
| [12] | Gao Miao, Yu Zhiguo, Li Qingqing, Wei Jinghe, Gu Xiaofeng. Improved ECG signal compression method for E-healthcare [J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(4): 62-69. |
| [13] | . Compatible-invariant subset analysis of deterministic finite automata via semi-tensor product of matrices approach [J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(5): 75-82. |
| [14] | . On-line learning algorithm for dynamic sensitivity control in IEEE 802.11ax network [J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(5): 67-74. |
| [15] | Wang Jun, Wang Yue, Wang Menglin, Liu Junjie. IDRMS: an improved dynamic replication management scheme for cloud storage [J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(4): 66-74. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||