Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (10): 8-16.doi: 10.11959/j.issn.2096-109x.2016.00101
• Comprehensive Reviews • Previous Articles Next Articles
Revised:
2016-09-27
Online:
2016-10-01
Published:
2020-03-17
Supported by:
CLC Number:
Peng XU,Hai JIN. Research on the searchable encryption[J]. Chinese Journal of Network and Information Security, 2016, 2(10): 8-16.
[1] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable sym-metric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 79-88. |
[2] | SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security &Privacy. 2000: 44-55. |
[3] | GOH E J.Secure indexes . Cryptography ePrint archive[R]. 2003. |
[4] | CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[M]// Applied Cryptography and Network Security. Berlin Heidelberg: SpringerPress, 2015: 442-455. |
[5] | BELLOVIN S M , CHESWICK W R . Privacy-enhanced searches using encrypted bloom filters[J].Department of Computer Science Columbia University, 2004. |
[6] | AGRAWAL R , KIERNAN J , SRIKANT R ,et al. Order preserving encryption for numeric data[C]// ACM Sigmod. 2004: 563-574. |
[7] | WATERS B R , BALFANZ D , DURFEE G ,et al. Building an encrypted and searchable audit log[J].2003.Annual Network & Distributed System Security Symposium, 2003. |
[8] | BRINKMAN R , DOUMEN J , JONKER W . Using secret sharing for searching in encrypted data[J]. Lecture Notes in Computer Science, 2004,3178: 18-27. |
[9] | DAMIANI E , VIMERCATI S D C , JAJODIA S ,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs[C]// ACM CCS. 2003: 93-102. |
[10] | HACIGüMüS H , IYER B R , LI C ,et al. Executing SQL over encrypted data in the database-service-provider model[C]// SIGMOD. 2002: 216-227. |
[11] | HACIGüMü? H , IYER B , MEHROTRA S . Efficient execution of aggregation queries over encrypted relational databases[J]. Lecture Notes in Computer Science, 2004,2973: 125-136. |
[12] | KANTARCIOGLU M , CLIFTON C . Security issues in querying encrypted data[M]// Data and Applications Security XIX. Berlin Heidelberg: SpringerPress, 2005: 325-337. |
[13] | BAO F , DENG R H , DING X ,et al. Private query on encrypted data in multi-user settings[J]. Lecture Notes in Computer Science, 2008,4991: 71-85. |
[14] | JARECKI S , JUTLA C , KRAWCZYK H ,et al. Outsourced symmetric private information retrieval[C]// ACM Sigsac Conference on Computer & Communications Security. 2013: 875-888. |
[15] | KATZ J , SAHAI A , WATERS B . Predicate encryption supporting disjunctions,polynomial equations,and inner products[J]. Journal of Cryptology, 2008: 191-224. |
[16] | CASH D , JARECKI S , JUTLA C ,et al. Highly-scalable searchable symmetric encryption with support for boolean queries[M]// Advances in Cryptology-CRYPTO 2013. Berlin Heidelberg: SpringerPress, 2013: 353-373. |
[17] | LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[J]. Infocom, 2012,3(9): 1-5. |
[18] | BRINGER J,CHABANNE , KINDARJI B . Error-tolerant searchable encryption[C]// IEEE International Conference on Communications. 2009: 1-6. |
[19] | LIU Z , MA H , LI J ,et al. Secure storage and fuzzy query over encrypted databases[C]// International Conference on Network and System Security. 2013: 439-450. |
[20] | NEPOLEAN D , KARTHIK I , PREETHI MU ,et al. Privacy pre-serving ranked keyword search over encrypted cloud data[M]// Recent Trends in Computer Networks and Distributed Systems Security. Berlin Heidelberg: SpringerPress, 2014: 396-403. |
[21] | WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[C]// IEEE International Conference on Distributed Computing Systems,IEEE Computer Society. 2010: 253-262. |
[22] | WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2012,23(8): 1467-1479. |
[23] | CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(1): 222-233. |
[24] | LU Y , . Privacy-preserving logarithmic-time search on encrypted data in cloud[C]// NDSS. 2012. |
[25] | BOLDYREVA A , CHENETTE N , LEE Y ,et al. Order-preserving symmetric encryption[C]// The International Conference on the Theory and Applications of Cryptographic Techniques. 2009: 224-241. |
[26] | CHASE M , KAMARA S . Structured encryption and controlled disclosure[M]// Advances in Cryptology-ASIACRYPT 2010. Berlin Heidelberg: SpringerPress, 2010: 577-594. |
[27] | KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// ACM Conference on Computer &Communications Security. 2015: 965-976. |
[28] | KAMARA S , PAPAMANTHOU C . Parallel and dynamic searchable symmetric encryption[M]// Financial Cryptography and Data Security. Berlin Heidelberg: SpringerPress, 2013: 258-274. |
[29] | CASH D , JAEGER J , JARECKI S ,et al. Dynamic searchable encryption in very-large databases:data structures and implementation[C]// Network and Distributed System Security Symposium. 2014. |
[30] | HAHN F , KERSCHBAUM F . Searchable encryption with secure and efficient updates[C]// ACM CCS. 2014: 310-320. |
[31] | DAN B , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[M]// Advances in Cryptology Eurocrypt. Berlin Heidelberg: SpringerPress, 2003: 506-522. |
[32] | ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J]. Journal of Cryptology, 2008,21(3): 350-391. |
[33] | BALLARD L , KAMARA S , MONROSE F . Achieving efficient conjunctive keyword searches over encrypted data[C]// Interna tional Conference on Information and Communications Security. 2005: 414-426. |
[34] | BAEK J , SAFAVINAINI R , SUSILO W . Public key encryption with keyword search revisited[M]// Computational Science and Its Applications–ICCSA. 2008: 1249-1259. |
[35] | GOLLE P , STADDON J , WATERS B R . Secure conjunctive keyword search over encrypted data[J]. Lecture Notes in Computer Science, 2004,3089: 31-45. |
[36] | HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[M]// Pairing-Based Cryptography – Pairing 2007. Berlin Heidelberg: SpringerPress, 2007: 2-22. |
[37] | DONG J P , KIM K , LEE P J . Public key encryption with conjunctive field keyword search[J]. Lecture Notes in Computer Science, 2004,3325: 73-86. |
[38] | RYU E K , TAKAGI T . Efficient conjunctive keyword-searchable encryption[C]// The International Conference on Advanced Information Networking and Applications Workshops,IEEE Computer Society. 2007: 409-414. |
[39] | BETHENCOURT J , CHAN H , PERRIG A ,et al. Anonymous multi-attribute encryption with range query and conditional decryption[C]. IEEE Symposium on Security & Privacy. 2006. |
[40] | SHI E , BETHENCOURT J , CHAN T H ,et al. Multi-dimensional range query over encrypted data[J]. IEEE Computer Society, 2007: 350-364. |
[41] | DAN B , WATERS B . Conjunctive,subset,and range queries on encrypted data[C]// The Theory of Cryptography Conference. 2006 535-554. |
[42] | DAVIS D , MONROSE F , REITER M K . Time-scoped searching of encrypted audit logs[C]// The International Conference on Information and Communications Security(ICICS). 2004: 532-545. |
[43] | CHEUNG D W , MAMOULIS N , WONG W K ,et al. Anonymous fuzzy identity-based encryption for similarity search[C]// International Symposiumon Algorithms and Computation. 2010: 61-72. |
[44] | SEDGHI S , LIESDONK P V , NIKOVA S ,et al. Searching keywords with wildcards on encrypted data[C]// The International Conference on Security and Cryptography for Networks. 2010: 138-153. |
[45] | LUAN I , NIKOVA S , HARTEL P ,et al. Public-key encryption with delegated search[M]// Applied Cryptography and Network Security. Berlin Heidelberg: SpringerPress, 2011: 532-549. |
[46] | YANG G , TAN C H , HUANG Q ,et al. Probabilistic public key encryption with equality test[C]// The International Conference on Topics in Cryptology. 2010: 119-131. |
[47] | ARRIAGA A , TANG Q , RYAN P . Trapdoor privacy in asymmetric searchable encryption schemes[M]// Progress in Cryptology–AFRICACRYPT 2014. Springer International Publishing, 2014: 31-50. |
[48] | CAMENISCH J , KOHLWEISS M , RIAL A ,et al. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data[C]// The International Conference on Practice and Theory in Public Key Cryptography. 2009: 196-214. |
[49] | BYUN J W , LEE D H , LIM J . Efficient conjunctive keyword search on encrypted data storage system[C]// European Conference on Public Key Infrastructure:Theory and Practice. 2006: 184-196. |
[50] | JEONG I R , KWON J O , HONG D ,et al. Constructing PEKS schemes secure against keyword guessing attacks is possible?[J]. Computer Communications, 2009,32(2): 394-396. |
[51] | FANG L , SUSILO W , GE C ,et al. A secure channel free public key encryption with keyword search scheme without random oracle[C]// The International Conference on Cryptology and Network Security. 2009: 248-258. |
[52] | TANG Q , CHEN L . Public-key encryption with registered keyword search[C]// European Workshop on Public Key Infrastructures,Services and Applications. 2009: 163-178. |
[53] | HARROWER W . Searching encrypted data[R]. 2009. |
[54] | XU P , JIN H , WU Q ,et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277. |
[55] | BELLARE M , BOLDYREVA A,O’NEILL A . Deterministic and efficiently searchable encryption[M]// Advances in Cryptology CRYPTO 2007. Berlin Heidelberg : SpringerPress, 2007: 535-552. |
[56] | BELLARE M , BOLDYREVA A,O’NEILL A . Deterministic and efficiently searchable encryption[C]// The International Cryptology Conference on Advances in Cryptology. 2006: 535-552. |
[57] | BOLDYREVA A , FEHR S,O’NEILL A . On notions of security for deterministic encryption,and efficient constructions without random oracles[C]// Conference on Cryptology:Advances in Cryptology. 2008: 335-359. |
[58] | BRAKERSKI Z , SEGEV G . Better security for deterministic public-key encryption:the auxiliary-input setting[M]// Advances in Cryptology-CRYPTO 2011. Berlin Heidelberg: SpringerPress, 2011: 543-560. |
[59] | XU P , WU Q , WANG W ,et al. Generating searchable public-key ciphertexts with hidden structures for fast keyword search[J]. IEEE Transactions on Information Forensics & Security, 2015,10(9):1. |
[60] | BOYEN X , WATERS B . Anonymous hierarchical identity-based encryption (without random oracles)[C]// The International Conference on Advances in Cryptology. 2006: 290-307. |
[61] | ABDALLA M , CATALANO D , FIORE D . Verifiable random functions:relations to identity-based key encapsulation and new constructions[J]. Journal of Cryptology, 2014,27(3): 544-593. |
[1] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[2] | Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG. Searchable encryption scheme based on attribute policy hiding in a cloud environment [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 112-121. |
[3] | Fuyuan SONG, Zheng QIN, Jixin ZHANG, Yu LIU. Efficient and secure multi-user outsourced image retrieval scheme with access control [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 29-39. |
[4] | Wei ZENG, Hongchao HU, Lingshu LI, Shumin HUO. Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 95-104. |
[5] | Ying WU,Xuan LI,Biao JIN,Rongrong JIN. Survey on the privacy-preserving content based image retrieval [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28. |
[6] | Yan ZHANG,Jinfan WANG,Zhuyun QI,Rongwei YANG,Yi WANG. Decentralized searchable encryption scheme based on dynamic accumulator [J]. Chinese Journal of Network and Information Security, 2019, 5(2): 23-29. |
[7] | Ying LI, Chunguang MA. Overview of searchable encryption research [J]. Chinese Journal of Network and Information Security, 2018, 4(7): 13-21. |
[8] | Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG. Survey on public key encryption with equality test [J]. Chinese Journal of Network and Information Security, 2018, 4(11): 13-22. |
[9] | Jiang-yong SHI,Yue-xiang YANG,Wen-hua LI,Sen WANG. Research on SDN-based cloud security application [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 10-25. |
[10] | Zhi-qiang ZHU,Hang SU,Lei SUN,Zuo-hui LI. Research on attribute-based encryption with keyword search for cloud storage [J]. Chinese Journal of Network and Information Security, 2017, 3(11): 1-11. |
[11] | Miao ZHANG,Xin-sheng JI,Jian-jian AI,Wen-yan LIU,Hong-chao HU,Shu-min HUO. Secure deployment strategy of virtual machines based on operating system diversity [J]. Chinese Journal of Network and Information Security, 2017, 3(10): 35-43. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|