[1] |
董晓蕾, 周俊, 曹珍富 . 可搜索加密研究进展[J]. 计算机研究与发展, 2017,54(10): 2107-2120.
|
|
DONG X L , ZHOU J , CAO Z F . Research advances on secure searchable encryption[J]. Journal of Computer Research and Development, 2017,54(10): 2107-2120.
|
[2] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceedings of IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55.
|
[3] |
吴志强, 李肯立, 郑蕙 . 高效可扩展的对称密文检索架构[J]. 通信学报, 2017,38(8): 79-93.
|
|
WU Z Q , LI K L , ZHENG H . Efficient and scalable architecture for searchable symmetric encryption[J]. Journal on Communications, 2017,38(8): 79-93.
|
[4] |
杜瑞忠, 谭艾伦, 田俊峰 . 基于区块链的公钥可搜索加密方案[J]. 通信学报, 2020,41(4): 114-122.
|
|
DU R Z , TAN A L , TIAN J F . Public key searchable encryption scheme based on blockchain[J]. Journal on Communications, 2020,41(4): 114-122.
|
[5] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 965-976.
|
[6] |
STEFANOV E , PAPAMANTHOU C , SHI E . Practical dynamic searchable encryption with small leakage[C]// Proceedings 2014 Network and Distributed System Security Symposium. Virginia:the Internet Society, 2014: 72-75.
|
[7] |
BOST R , MINAUD B , OHRIMENKO O . Forward and backward private searchable encryption from constrained cryptographic primitives[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 1465-1482.
|
[8] |
CASH D , GRUBBS P , PERRY J ,et al. Leakage-abuse attacks against searchable encryption[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 668-679.
|
[9] |
ZHANG Y P , KATZ J , PAPAMANTHOU C . All your queries are belong to us:the power of file-injection attacks on searchable encryption[R]. IACR Cryptology EPrint Archive, 2016.
|
[10] |
BOST R , . ∑oφo?:forward secure searchable encryption[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 1143-1154.
|
[11] |
SUN S F , YUAN X L , LIU J K ,et al. Practical backward-secure searchable encryption from symmetric puncturable encryption[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 763-780.
|
[12] |
CHAMANI J G , PAPADOPOULOS D , PAPAMANTHOU C ,et al. New constructions for forward and backward private symmetric searchable encryption[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 1038-1055.
|
[13] |
RIZOMILIOTIS P , GRITZALIS S . Simple forward and backward private searchable symmetric encryption schemes with constant number of roundtrips[C]// Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop. New York:ACM Press, 2019: 141-152.
|
[14] |
黄珂 . 前向和后向安全的动态对称可搜索加密方案的研究[D]. 上海:华东师范大学, 2019.
|
|
HUANG K . Research on forward and backward security of dynamic symmetric searchable encryption scheme[D]. Shanghai:East China Normal University, 2019.
|
[15] |
SARDAR L , RUJ S . FSPVDSSE:a forward secure publicly verifiable dynamic SSE scheme[C]// International Conference on Provable Security. Berlin:Springer, 2019: 355-371.
|
[16] |
ZUO C , SUN S F , LIU J K ,et al. Dynamic searchable symmetric encryption with forward and stronger backward privacy[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2019: 283-303.
|
[17] |
ZUO C , SUN S F , LIU J K ,et al. Forward and backward private DSSE for range queries[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(1): 328-338.
|
[18] |
CASH D , JARECKI S , JUTLA C ,et al. Highly-scalable searchable symmetric encryption with support for Boolean queries[C]// Annual Cryptology Conference. Berlin:Springer, 2013: 353-373.
|
[19] |
LAI S Q , PATRANABIS S , SAKZAD A ,et al. Result pattern hiding searchable encryption for conjunctive queries[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 745-762.
|
[20] |
WU Z Q , LI K L . VBTree:forward secure conjunctive queries over encrypted data for cloud computing[J]. The VLDB Journal, 2019,28(1): 25-46.
|
[21] |
ZUO C , SUN S , LIU J K ,et al. Forward and backward private dynamic searchable symmetric encryption for conjunctive queries[R]. IACR Cryptology EPrint Archive, 2020.
|
[22] |
PATRANABIS S , MUKHOPADHYAY D . Forward and backward private conjunctive searchable symmetric encryption[C]// Proceedings 2021 Network and Distributed System Security Symposium. Virginia:the Internet Society, 2021:doi.org/10.14722/ndss.2021.23116.
|
[23] |
FU Z J , WU X L , GUAN C W ,et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12): 2706-2716.
|