Về một phương pháp tìm kiếm an toàn trong lưu trữ dữ liệu đám mây
Tóm tắt
Từ khóa
#Cloud storage; Searchable encryption; Secure search; Digital signature; Encrypted data search.Tài liệu tham khảo
[1]. Li, F. et al. "A Survey on Searchable Symmetric Encryption", ACM Computing Surveys, 56(5), Article 119, (2023). https://dl.acm.org/doi/10.1145/3617991
[2]. Yan, L., Wang, G., Yin, T., Liu, P., Feng, H., Zhang, W., Hu, H., & Pan, F. "Attribute-Based Searchable Encryption: A Survey", Electronics, 13(9), 1621, (2024). https://doi.org/10.3390/electronics13091621
[3]. Kishiyama, B., & Alsmadi, I. "A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption", International Journal of Science, Technology and Society, 12(2), (2024).
[4]. Chen, T et al. "The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption", NDSS, (2023). https://doi.org/10.14722/ndss.2023.24725
[5]. Shi, D et al.. "SPKSE: Secure Public Key Searchable Encryption Withstand Keyword Guessing Attacks", Scientific Reports, 15, 19658, (2025). https://doi.org/10.1038/s41598-025-01454-9
[6]. Cai, J., Zhao, X., Li, D., Li, H., & Fan, K. "Efficient and Expressive Public Key Authenticated Encryption with Keyword Search in Multi-user Scenarios", Cryptography and Security (cs.CR), (2025). https://doi.org/10.48550/arXiv.2503.16828
[7]. Xu, Y., Cheng, H., Li, J., & Liu, X. "Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search", IEEE Transactions on Information Forensics and Security, (2025). https://doi.org/10.1109/TIFS.2025.3550054
[8]. Zhang, K., Hu, B., Ning, J., Gong, J., & Qian, H. "Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage", IEEE Transactions on Knowledge and Data Engineering, 37, 2802–2815, (2025). https://doi.org/10.1109/TKDE.2025.3537613
[9]. Xu, S., Cao, Y., Chen, X., Guo, Y., Yang, Y., Guo, F., & Yiu, S.-M. "Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications", Cryptology ePrint Archive, (2023).
[10]. Zhu, T., Wang, J., Xiao, Y., Gao, Y., Zhou, Y., & Weng, J. "Fully-incremental Public Key Encryption with Adjustable Timed-release Keyword Search", Information Sciences, 702, 121887, (2025).
[11]. Ngoc, D. T. B., & Truong, N. D. "Developing a digital signature scheme avoids attacks based on the order of the generator element", Journal of Military Science and Technology, 101, 131–139, (2025).
[12]. "The Sonnets", (n.d.). https://ocw.mit.edu/ans7870/6/6.006/s08/lecturenotes/files/t8.shakespeare.txt
