[1] |
CHASE M , KAMARA S . Structured encryption and controlled disclosure[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2010: 577-594.
|
[2] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceedings of IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2002: 44-55.
|
[3] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// Pro ceedings of the 13th ACM conference on Computer and communications security. New York:ACM Press, 2006: 79-88.
|
[4] |
KAMARA S , MOATAZ T , OHRIMENKO O . Structuredencryption and leakage suppression[C]// Annual International Cryptology Conference. Cham:Springer, 2018: 339-370.
|
[5] |
KAMARA S , MOATAZ T . SQL on Structurally-encrypted databases[C]// International Conference on the Theory and Application of Cryptology and Information Security. Cham:Springer, 2018: 149-180.
|
[6] |
ISLAM M S , KUZU M , KANTARCIOGLU M . Access pattern disclosure on searchable encryption:ramification,attack and mitigation[C]// Network and Distributed System Security Symposium. Piscataway:IEEE Press, 2012: 1-15.
|
[7] |
CASH D , GRUBBS P , PERRY J ,et al. Leakage-abuse attacks against searchable encryption[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 668-679.
|
[8] |
KELLARIS G , KOLLIOS G , NISSIM K ,et al. Generic attacks on secure outsourced databases[C]// Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 1329-1340.
|
[9] |
OYA S , KERSCHBAUM F . Hiding the access pattern is not enough:exploiting search pattern leakage in searchable encryption[J]. arXiv Preprint,arXiv:2010.03465, 2020.
|
[10] |
BLACKSTONE L , KAMARA S , MOATAZ T . Revisiting leakage abuse attacks[C]// Network and Distributed System Security Symposium. Piscataway:IEEE Press, 2020: 1-18.
|
[11] |
PODDAR R , WANG S , LU J N ,et al. Practical volume-based attacks on encrypted databases[C]// Proceedings of 2020 IEEE European Symposium on Security and Privacy (EuroS&P). Piscataway:IEEE Press, 2020: 354-369.
|
[12] |
GRUBBS P , LACHARITE M S , MINAUD B ,et al. Pump up the volume:practical database reconstruction from volume leakage on range queries[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 315-331.
|
[13] |
GUI Z C , PATERSON K G , PATRANABIS S . Rethinking searchable symmetric encryption[C]// Proceedings of 2023 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2023: 1401-1418.
|
[14] |
GARG S , MOHASSEL P , PAPAMANTHOU C . TWORAM:efficient oblivious ram in two rounds with applications to searchable encryption[C]// Annual International Cryptology Conference. Berlin:Springer, 2016: 563-592.
|
[15] |
DEMERTZIS I , PAPADOPOULOS D , PAPAMANTHOU C ,et al. SEAL:attack mitigation for encrypted databases via adjustable leakage[C]// Proceedings of the 29th USENIX Conference on Security Symposium. New York:ACM Press, 2020: 2433-2450.
|
[16] |
CHEN G X , LAI T H , REITER M K ,et al. Differentially private access patterns for searchable symmetric encryption[C]// Proceedings of IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2018: 810-818.
|
[17] |
SHANG Z , OYA S , PETER A ,et al. Obfuscated access and search patterns in searchable encryption[J]. arXiv Preprint,arXiv:2102.09651, 2021.
|
[18] |
REN K , GUO Y , LI J Q ,et al. HybrIDX:new hybrid index for volume-hiding range queries in data outsourcing services[C]// Proceedings of 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). Piscataway:IEEE Press, 2021: 23-33.
|
[19] |
KAMARA S , MOATAZ T . Computationally Volume-Hiding Structured Encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cham:Springer, 2019: 183-213.
|
[20] |
PATEL S , PERSIANO G , YEO K ,et al. Mitigating leakage in secure cloud-hosted data structures:volume-hiding for multi-maps via hashing[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2019: 79-93.
|
[21] |
JOOS M , ZIPF G K . The psycho-biology of language[J]. Language, 1936,12(3): 196.
|
[22] |
GOLDREICH O , GOLDWASSER S , MICALI S . How to construct random functions[J]. Journal of the ACM, 1986,33(4): 792-807.
|
[23] |
WANG J F , SUN S F , LI T C ,et al. Practical volume-hiding encrypted multi-maps with optimal overhead and beyond[C]// Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2022: 2825-2839.
|
[24] |
GRAF T M , LEMIRE D . Xor filters:faster and smaller than bloom and cuckoo filters[J]. ACM Journal of Experimental Algorithmics, 2020,25: 1-16.
|
[25] |
DEMERTZIS I , PAPADOPOULOS S , PAPAPETROU O ,et al. Practical private range search revisited[C]// Proceedings of the 2016 International Conference on Management of Data. New York:ACM Press, 2016: 185-198.
|
[26] |
刘文心, 高莹 . 对称可搜索加密的安全性研究进展[J]. 信息安全学报, 2021,6(2): 73-84.
|
|
LIU W X , GAO Y . A survey on security development of searchable symmetric encryption[J]. Journal of Cyber Security, 2021,6(2): 73-84.
|
[27] |
NING J T , HUANG X Y , POH G S ,et al. LEAP:leakage-abuse attack on efficiently deployable,efficiently searchable encryption with partially known dataset[C]// Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2021: 2307-2320.
|
[28] |
GUI Z C , JOHNSON O , WARINSCHI B . Encrypted databases:new volume attacks against range queries[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2019: 361-378.
|