WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 440-442.
[1] Boneh D, Grescenzo G D, Ostrovsky R, et al. Public key encryption with keyword Search [C]//Proceedings of Eurocrypt’04, LNCS 3027. Berlin,Germany: Springer-Verlag, 2004: 506-522.[2] Beak J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revised [C]//Proceedings of the International Conference on Computational Science and Its Applications (ICCSA ’08). Berlin:Springer-Verlag, 2008: 1249-1259.[3] Park J H. Efficient hidden vector encryption for conjunctive queries on encrypted data [J]. IEEE Transactions on Knowledge and Data Engineering, 2011,23(10): 1483-1497.[4] Zhang B, Zhang F. An efficient public key encryption with conjunctive-subset keywords search [J]. Journal of Network and Computer Applications, 2011, 34(1):262-267.[5] Byun J W, Rhee H S, Park H A, et al. Offline keyword guessing attacks on recent keyword search schemes over encrypted data [C]//Proceedings of Secure Data Management, Third VLDB Workshop SDM’06, LNCS 4156. Berlin, Germany: Springer-Verlag, 2006: 75-83.[6] Rhee H S, Susilo W, Kim H J. Secure searchable public key encryption scheme against keyword guessing attacks [J]. IEICE Electronics Express, 2009, 6(5):237-243.[7] Jeong I R, Kwon J O, Hong D, et al. Constructing PEKS schemes secure against keyword guessing attacks is possible? [J] Computer Communications,2009, 32(2): 394-396.