Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (7): 13-21.doi: 10.11959/j.issn.2096-109x.2018062
• Comprehensive Reviews • Previous Articles Next Articles
Ying LI,Chunguang MA
Revised:
2018-07-05
Online:
2018-07-15
Published:
2018-09-10
Supported by:
CLC Number:
Ying LI, Chunguang MA. Overview of searchable encryption research[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 13-21.
[1] | 项菲, 刘川意, 方滨兴 ,等. 云计算环境下密文搜索算法的研究[J]. 通信学报, 2013(7): 143-153. |
XIANG F , LIU C Y , FANG B X ,et al. Research on ciphertext search for the cloud environment[J]. Journal on Communications, 2013,34(7): 143-153. | |
[2] | SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Computer Society. 2000:44. |
[3] | 李经纬, 贾春福, 刘哲理 ,等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128. |
LI J W , JIA C F , LIU Z L ,et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128. | |
[4] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// ACM Conference on Computer and Communications Security. ACM, 2006: 79-88. |
[5] | WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[C]// IEEE International Conference on Distributed Computing Systems. 2010: 253-262. |
[6] | PREMASATHIAN N , CHOTO S . Searchable encryption schemes:with multiplication and simultaneous congruences[C]// IEEE International ISC Conference on Information Security and Cryptology. 2013: 147-150. |
[7] | PREMASATHIAN N , CHOTO S . Searchable encryption schemes:with multiplication and simultaneous congruences[C]// International ISC Conference on Information Security and Cryptology. 2013: 147-150. |
[8] | FU Z , SHU J , SUN X ,et al. Smart cloud search services:verifiable keyword-based semantic search over encrypted cloud data[J]. IEEE Transactions on Consumer Electronics, 2014,60(4): 762-770. |
[9] | FU Z , SUN X , LINGE N ,et al. Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J]. IEEE Transactions on Consumer Electronics, 2014,60(1): 164-172. |
[10] | XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(2): 340-352. |
[11] | 杨旸, 杨书略, 蔡圣暐 ,等. 排序可验证的语义模糊可搜索加密方案[J]. 四川大学学报(工程科学版), 2017,49(4): 119-128. |
YANG Y , YANG S L , CAI S . Semantically searchable encryption scheme supporting ranking verification[J]. Journal of Sichuan University(Engineering Science Edition), 2017,49(4): 119-128. | |
[12] | CASH D , JARECKI S , JUTLA C ,et al. Highly-scalable searchable symmetric encryption with support for boolean queries[M]// Advances in Cryptology–CRYPTO 2013.Berlin:Springer. 2013: 353-373. |
[13] | LI H , YANG Y , LUAN T ,et al. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data[J]. IEEE Transactions on Dependable & Secure Computing, 2016,13(3): 312-325. |
[14] | 宋衍, 韩臻, 陈栋 ,等. 支持关键词任意连接搜索的属性加密方案[J]. 通信学报, 2016,37(8): 77-85. |
SONG Y , HAN Z , CHEN D . Attribute-based encryption supporting arbitrary conjunctive key word search[J]. Journal on Communications, 2016,37(8): 77-85. | |
[15] | CHEN R , MU Y , YANG G ,et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics & Security, 2017,11(4): 789-798. |
[16] | CHEN R , MU Y , YANG G ,et al. Server-aided public key encryption with keyword search[J]. IEEE Transactions on Information Forensics & Security, 2016,11(12): 2833-2842. |
[17] | FU Z , REN K , SHU J ,et al. Enabling personalized search over encrypted outsourced data with efficiency improvement[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(9): 2546-2559. |
[18] | FU Z , SUN X , JI S ,et al. Towards efficient content-aware search over encrypted outsourced data in cloud[C]// IEEE International Conference on Computer Communications, 2016: 1-9. |
[19] | BRINGER J , CHABANNE H , KINDARJI B . Error-tolerant searchable encryption[C]// IEEE International Conference on Communications. 2009: 1-6. |
[20] | LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// INFOCOM. 2010. 1-5. |
[21] | CHUAH M , HU W . Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data[C]// International Conference on Distributed Computing Systems Workshops. IEEE, 2011. 273-281. |
[22] | 杨旸, 杨书略, 柯闽 . 加密云数据下基于Simhash的模糊排序搜索方案[J]. 计算机学报, 2017,40(2): 431-444. |
YANG Y , YANG S L , KE M . Ranked fuzzy keyword search based on simhash over encrypted cloud data[J]. Chinese Journal of Computers, 2017,40(2): 431-444. | |
[23] | 王恺璇, 李宇溪, 周福才 ,等. 面向多关键字的模糊密文搜索方法[J]. 计算机研究与发展, 2017,54(2): 348-360. |
WANG K X , LI Y X , ZHOU F C ,et al. Multi-keyword fuzzy search over encrypted data[J]. Journal of Computer Research and Development, 2017,54(2): 348-360. | |
[24] | GOH E J . Secure Indexes[J]. Submission, 2003. |
[25] | CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005: 442-455. |
[26] | CHAI Q , GONG G . Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]// IEEE International Conference on Communications. 2012. 917-922. |
[27] | 柳祚鹏 . 支持同义词搜索和抗信息泄漏的对称可搜索加密技术研究[D]. 上海:上海交通大学, 2015. |
LIU Z P . Research on symmetric searchable encryption technology supporting synonym search and anti-information leak-age[D]. Shanghai:Shanghai Jiaotong University, 2015. | |
[28] | 陆海宁 . 可隐藏搜索模式的对称可搜索加密方案[J]. 信息网络安全, 2017(01): 38-42. |
LU H N . Searchable symmetric encryption with hidden search pattern[J]. Netinfo Security, 2017(1): 38-42. | |
[29] | BONECH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522. |
[30] | GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[J]. Lecture Notes in Computer Science, 2004,3089: 31-45. |
[31] | BONEH D , WATERS B . Conjunctive,subset,and range queries on encrypted data[J]. TCC 2007, 2007,4392: 535-554. |
[32] | ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous ibe,and extensions[M]// Advances in Cryptology–CRYPTO 2005. 2005. 205-222. |
[33] | PARK D , KIM K , LEE P . Public key encryption with conjunctive field keyword search in information security applications[C]// The 5th International Workshop (WISA’04). 2004. 23-25. |
[34] | DONG J P , KIM K , LEE P J . Public key encryption with conjunctive field keyword search[M]. Information Security Applications.Berlin:Springer. 2004. 73-86. |
[35] | YONG H H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]// International Conference on Pairing-Based Cryptography. 2007. 2-22. |
[36] | HU C , LIU P . Public key encryption with ranked multi-keyword search[C]// International Conference on Intelligent Networking and Collaborative Systems. 2013. 109-113. |
[37] | MIAO Y , MA J , LIU X ,et al. VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner[J]. Peer-to-Peer Networking and Applications, 2016(1): 1-11. |
[38] | 张楠, 陈兰香 . 一种高效的支持排序的关键词可搜索加密系统研究[J]. 信息网络安全, 2017(2): 43-50. |
ZHANG N , CHEN L X . Research on an efficient ranked keywords searchable encryption system[J]. Netinfo Security, 2017(2): 43-50. | |
[39] | BRINGER J , CHABANNE H . Embedding edit distance to enable private keyword search[J]. Human-centric Computing and Information Sciences, 2012,2(1): 1-12. |
[40] | DONG Q , GUAN Z , WU L ,et al. Fuzzy keyword search over encrypted data in the public key setting[C]// International Conference on Web-Age Information Management. Springer Berlin Heidelberg, 2013, 729-740. |
[41] | JIN W B , RHEE H S , PARK H A ,et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]// The Workshop on Secure Data Management. Springer Berlin Heidelberg, 2006: 75-83. |
[42] | JEONG I R , KWON J O , HONG D ,et al. Constructing PEKS schemes secure against keyword guessing attacks is possible?[J]. Computer Communications, 2009,32(2): 394-396. |
[43] | TANG Q , CHEN L . Public-key encryption with registered keyword search[C]// European Conference on Public Key Infrastructures,Services and Applications. Springer-Verlag, 2009. 163-178. |
[44] | 方黎明 . 带关键字搜索公钥加密的研究[D]. 南京航空航天大学, 2012. |
FANG L M . Research on keyword encryption with keyword search[D]. Naijing:Nanjing Aerospace University, 2012. | |
[45] | XU P , JIN H , WU Q ,et al. Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack[J]. IEEE Transactions on Computers, 2013,62(11): 2266-2277. |
[46] | CHEN R , MU Y , YANG G ,et al. dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics & Security, 2017,11(4): 789-798. |
[1] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[2] | Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU. Strategy of container migration and honeypot deployment based on signal game in cloud environment [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 87-96. |
[3] | Shang LIU, Yinzhang GUO. Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 176-188. |
[4] | Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG. Searchable encryption scheme based on attribute policy hiding in a cloud environment [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 112-121. |
[5] | Yi ZHANG, Liqin TIAN, Zenan WU, Wenxing WU. Trust evaluation optimization mechanism for cloud user behavior based on FANP [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 175-182. |
[6] | Fuyuan SONG, Zheng QIN, Jixin ZHANG, Yu LIU. Efficient and secure multi-user outsourced image retrieval scheme with access control [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 29-39. |
[7] | Ying WU,Xuan LI,Biao JIN,Rongrong JIN. Survey on the privacy-preserving content based image retrieval [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28. |
[8] | Yan ZHANG,Jinfan WANG,Zhuyun QI,Rongwei YANG,Yi WANG. Decentralized searchable encryption scheme based on dynamic accumulator [J]. Chinese Journal of Network and Information Security, 2019, 5(2): 23-29. |
[9] | Mengyang YU,Hui LIN,Youliang TIAN. New cross-layer reputation mechanism for mobile cloud computing [J]. Chinese Journal of Network and Information Security, 2018, 4(3): 51-58. |
[10] | Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG. Survey on public key encryption with equality test [J]. Chinese Journal of Network and Information Security, 2018, 4(11): 13-22. |
[11] | Jianbiao ZHANG,Yuanxi ZHU,Jun HU,Xiao WANG. Scheme of virtual machine trusted migration in cloud environment [J]. Chinese Journal of Network and Information Security, 2018, 4(1): 6-14. |
[12] | Weifeng LI,Weizhong QIANG,Weiming LI,Deqing ZOU. Research on forensics of privacy violations in cloud environment [J]. Chinese Journal of Network and Information Security, 2018, 4(1): 26-35. |
[13] | Yuan-zhao GAO,Xue-juan LI,Bing-long LI,Xi-xi WU. Cloud computing forensic model [J]. Chinese Journal of Network and Information Security, 2017, 3(9): 13-23. |
[14] | Xing-lan ZHANG,Xiang LIU. Secure efficient and verifiable large linear equations solve outsourcing computing scheme [J]. Chinese Journal of Network and Information Security, 2017, 3(6): 1-7. |
[15] | De-yu YUAN,Xiao-juan WANG,Jian-chao WAN. Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|