References
- Email Statistics Report, 2021-2025 Executive Summary. Accessed: Mar. 3, 2021. [Online]. Available: https://www.radicati.com/wp/wpcontent/uploads/2020/12
- D. Boneh, G. Di Crescenzo, and R. Ostrovsky, ''Public key encryption with keyword search,'' in Proc. Int. Conf. Theory Appl. Cryptograph. Techn., Interlaken, Switzerland, 2004, pp. 506-522.
- Y. Zhang, Y. Li, and Y. Wang, ''Efficient conjunctive keywords search over encrypted E-Mail data in public key setting,'' Appl. Sci., vol. 9, no. 18, p. 3655, Sep. 2019. https://doi.org/10.3390/app9183655
- P. Xu, S. Tang, P. Xu, Q. Wu, H. Hu, and W. Susilo, ''Practical multi-keyword and Boolean search over encrypted E-mail in cloud server,'' IEEE Trans. Services Comput., vol. 14, no. 6, pp. 1877-1889, Nov. 2021. https://doi.org/10.1109/TSC.2019.2903502
- H. Li, Q. Huang, J. Shen, G. Yang, and W. Susilo, ''Designatedserver identity-based authenticated encryption with keyword search for encrypted emails,'' Inf. Sci., vol. 481, pp. 330-343, May 2019. https://doi.org/10.1016/j.ins.2019.01.004
- J. Byun, H. Rhee, and H. Park, ''Off-line keyword guessing attacks on recent keyword search schemes over encrypted data,'' in Proc. Secure Data Manage., 2006, pp. 75-83.
- H. S. Rhee, W. Susilo, and H.-J. Kim, ''Secure searchable public key encryption scheme against keyword guessing attacks,'' IEICE Electron. Exp., vol. 6, no. 5, pp. 237-243, 2009. https://doi.org/10.1587/elex.6.237
- Q. Tang and L. Chen, ''Public-key encryption with registered keyword search,'' in Proc. Eur. Public Infrastruct. Workshop. Berlin, Germany: Springer, 2009, pp. 163-178.
- J. Chen, ''Cloud storage third-party data security scheme based on fully homomorphic encryption,'' in Proc. Int. Conf. Netw. Inf. Syst. Comput. (ICNISC), Apr. 2016, pp. 155-159.
- D. Boneh, A. Sahai, and B. Waters, ''Functional encryption: A new vision for public-key cryptography,'' Commun. ACM, vol. 55, no. 11, pp. 58-64, 2012.
- A. Sahai and B. Waters, ''Fuzzy identity-based encryption,'' in Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, 2005, pp. 457-473.
- J. Li, W. Yao, Y. Zhang, H. Qian, and J. Han, ''Flexible and fine-grained attribute-based data storage in cloud computing,'' IEEE Trans. Services Comput., vol. 10, no. 5, pp. 785-796, Jan. 2016. https://doi.org/10.1109/TSC.2016.2520932
- J. Li, W. Yao, J. Han, Y. Zhang, and J. Shen, ''User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage,'' IEEE Syst. J., vol. 12, no. 2, pp. 1767-1777, Jun. 2018. https://doi.org/10.1109/jsyst.2017.2667679
- J. Li, N. Chen, and Y. Zhang, ''Extended file hierarchy access control scheme with attribute based encryption in cloud computing,'' IEEE Trans. Emerg. Topics Comput., vol. 9, no. 2, pp. 983-993, Apr./Jun. 2021. https://doi.org/10.1109/TETC.2019.2904637
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, ''Attribute-based encryption for fine-grained access control of encrypted data,'' in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 89-98.
- N. Attrapadung and B. Libert, ''Expressive key-policy attribute-based encryption with constant-size ciphertexts,'' in Proc. 14th Int. Conf. Pract. Theory Public Cryptogr. Berlin, Germany: Springer, 2011, pp. 90-108.
- J. Li, Q. Yu, and Y. Zhang, ''Key-policy attribute-based encryption against continual auxiliary input leakage,'' Inf. Sci., vol. 470, pp. 175-188, Jan. 2019. https://doi.org/10.1016/j.ins.2018.07.077
- T. Nishide, K. Yoneyama, and K. Ohta, ''Attribute-based encryption with partially hidden encryptor-specified access structures,'' in Proc. 6th Int. Conf. Appl. Cryptogr. Netw. Secur., New York, NY, USA, 2008, pp. 111-129.
- J. Lai, R. H. Deng, and Y. Li, ''Expressive CP-ABE with partially hidden access structures,'' in Proc. 7th ACM Symp. Inf., Comput. Commun. Secur., Seoul, South Korea, 2012, pp. 18-19.
- S. Qiu, J. Liu, Y. Shi, and R. Zhang, ''Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack,'' Sci. China Inf. Sci., vol. 60, no. 5, May 2017, Art. no. 052105.
- A. Wu, D. Zheng, Y. Zhang, and M. Yang, ''Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing,'' Sensors, vol. 18, no. 7, pp. 2-17, 2018.
- A. Lewko, ''Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' Eurocrypt, vol. 6110, pp. 62-91, Dec. 2010.
- B. Waters, ''Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions,'' in Advances in Cryptology (Lecture Notes in Computer Science), vol. 5677, S. Halevi, Ed. Berlin, Germany: Springer, 2009, pp. 619-636.
- A. Lewko and B. Waters, ''New techniques for dual system encryption and fully secure HIBE wITH SHORT CIPHERtexts,'' in Theory of Cryptography (Lecture Notes in Computer Science), vol. 5978, D. Micciancio, Ed. Berlin, Germany: Springer, 2010, pp. 455-479.
- Q. Zheng, S. Xu, and G. Ateniese, ''VABKS: Verifiable attribute-based keyword search over outsourced encrypted data,'' in Proc. IEEE Conf. Comput. Commun., Toronto, ON, Canada, Apr. 2014, pp. 522-530.
- W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, ''Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,'' in Proc. IEEE Conf. Comput. Commun., Toronto, ON, Canada, Apr. 2014, pp. 226-234.
- S. Wang, D. Zhao, and Y. Zhang, ''Searchable attribute-based encryption scheme with attribute revocation in cloud storage,'' PLoS ONE, vol. 12, no. 8, Aug. 2017, Art. no. e0183459.
- J. Li, X. Lin, Y. Zhang, and J. Han, ''KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage,'' IEEE Trans. Services Comput., vol. 10, no. 5, pp. 715-725, Sep./Oct. 2017. https://doi.org/10.1109/TSC.2016.2542813
- X. Liu, T. Lu, X. He, X. Yang, and S. Niu, ''Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication,'' IEEE Access, vol. 8, pp. 52062-52074, 2020. https://doi.org/10.1109/access.2020.2980627
- S. Qiu, J. Liu, Y. Shi, and R. Zhang, ''Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack,'' Sci. China Inf. Sci., vol. 60, no. 5, May 2017, Art. no. 052105.
- A. Wu, D. Zheng, Y. Zhang, and M. Yang, ''Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing,'' Sensors, vol. 18, no. 7, pp. 2-17, 2018.
- X. Liu, T. Lu, X. He, X. Yang, and S. Niu, ''Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication,'' IEEE Access, vol. 8, pp. 52062-52074, 2020. https://doi.org/10.1109/access.2020.2980627
- F. Han, J. Qin, H. Zhao, and J. Hu, ''A general transformation from KPABE to searchable encryption,'' Future Gener. Comput. Syst., vol. 30, pp. 107-115, Jan. 2014. https://doi.org/10.1016/j.future.2013.09.013
- Y. Zhang, Y. Li, and Y. Wang, ''Efficient conjunctive keywords search over encrypted E-Mail data in public key setting,'' Appl. Sci., vol. 9, no. 18, p. 3655, Sep. 2019. https://doi.org/10.3390/app9183655
- H. Li, Q. Huang, J. Shen, G. Yang, and W. Susilo, ''Designatedserver identity-based authenticated encryption with keyword search for encrypted emails,'' Inf. Sci., vol. 481, pp. 330-343, May 2019. https://doi.org/10.1016/j.ins.2019.01.004
- D. Boneh, E. J. Goh, and K. Nissim, ''Evaluating 2-DNF formulas on ciphertexts,'' in Theory of Cryptography, vol. 3378, J. Kilian, Ed. Berlin, Germany: Springer, 2005, pp. 325-341. https://doi.org/10.1007/978-3-540-30576-7_18
- V. Goyal, A. Jain, and O. Pandey, ''Bounded ciphertext policy attribute based encryption,'' in Proc. 35th Int. Colloq. Autom., Lang. Program., 2008, pp. 1-5.
- J. Gao and F. Zhou, "An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search," in IEEE Access, vol. 10, pp. 8184-8193, 2022, doi: 10.1109/ACCESS.2021.3136331.
- Ulrich, Jan. Supervised machine learning for email thread summarization. Diss. University of British Columbia, 2008.
- J. Ulrich, G. Murray, and G. Carenini, ''A publicly available annotated corpus for supervised email summarization,'' in Proc. AAAI Workshop, 2008, pp. 77-82
- The Java Pairing Based Cryptography Library. Accessed: Apr. 23, 2022. [Online]. Available: http://gas.dia.unisa.it/projects/jpbc/