1Chang Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data [C]. in Proc. of ACNS'05, 2005.
2CURTMOLA R, GARAY J A, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[C], in Proc. of ACM CCS'06, 2006.
3GOLDREICH O, OSTROVSKY R. Software protection and simulation on oblivious rams[J]. Journal of the ACM, 1996, 43(3) :431 - 473.
4KAMARA S, LAUTER K. Cryptographic cloud storage[C]. Proceedings of Financial Cryptography: Workshop on Real- Life Cryptographic Protocols and Standardization 2010, January 2010.
5REN K, LOU W, KIM K, et al. A novel privacy preserving authentication and access control scheme for pervasive computing environment [J]. IEEE Transactions on Vehicular Technology, 2006,55 (4) : 1373-1384.
6BONEH D, WATERS B. Conjunctive, subset, and range queries on encrypted data. Proceedings of TCC 2007[C1. Lecture Notes in Computer Science 4392, 2007.
7SHI E, BETHENCOURT J, CHAN T-H. H, et al. Multi-dimensional range query over encrypted data [C]. Proceedings of IEEE Symposium on Security and Privacy, 2007.