Citation: | MA Changshe, LI Xiaocong, CHEN Hailong. Efficient Forward Secure Searchable Symmetric Encryption for Multi-user[J]. Journal of South China Normal University (Natural Science Edition), 2022, 54(6): 109-118. DOI: 10.6054/j.jscnun.2022092 |
[1] |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy. Massachusetts: IEEE, 2000: 44-55.
|
[2] |
GOH E J. Secure indexes[J]. IACR Cryptology ePrint Archive, 2003, 2003: 216/1-18.
|
[3] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Confe-rence on Computer and Communications Security. New York: ACM, 2006: 79-88.
|
[4] |
CASH D, JARECKI S, JUTLA C, et al. Highly-scalable searchable symmetric encryption with support for boolean queries[C]//Advances in Cryptology-CRYPTO 2013. Berlin: Springer, 2013: 353-373.
|
[5] |
SUN S F, LIU J K, SAKZAD A, et al. An efficient non-interactive multi-client searchable encryption with support for boolean queries[C]//European Symposium on Research in Computer Security. Cham: Springer, 2016: 154-172.
|
[6] |
孙僖泽, 周福才, 李宇溪, 等. 基于可搜索加密机制的数据库加密方案[J]. 计算机学报, 2021, 44(4): 806-819. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX202104009.htm
SUN X Z, ZHOU F C, LI Y X, et al. A database encryption scheme based on searchable encryption[J]. Chinese Journal of Computers, 2021, 44(4): 806-819. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX202104009.htm
|
[7] |
KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic searchable symmetric encryption[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. Raleigh: ACM, 2012: 965-976
|
[8] |
ZHANG Y P, KATZ J, PAPAMANTHOU C. All your queries are belong to us: the power of file-injection attacks on searchable encryption[C]//Proceedings of the 25th USENIX Conference on Security Symposium. Austin: USENIX Association, 2016: 707-720.
|
[9] |
STEFANOV E, PAPAMANTHOU C, SHI E. Practical dynamic searchable encryption with small leakage[C]// Proceedings of the 21th Annual Network and Distributed System Security Symposium. San Diego: The Internet Society, 2014: 72-75.
|
[10] |
GARG S, MOHASSEL P, PAPAMANTHOU C. TWORAM: round-optimal oblivious RAM with applications to searchable encryption[J]. Cryptology ePrint Archive, 2015, 2015: 1010/1-29.
|
[11] |
BOST R. ∑ oφoς: Forward secure searchable encryption[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna: ACM, 2016: 1143-1154.
|
[12] |
HE K, CHEN J, ZHOU Q X, et al. Secure dynamic searchable symmetric encryption with constant client sto-rage cost[J]. IEEE Transactions on Information Forensics and Security, 2020, 16: 1538-1549.
|
[13] |
ETEMAD M, KÜPÇÜ, PAPAMANTHOU C, et al. Efficient dynamic searchable encryption with forward privacy[J]. Proceedings on Privacy Enhancing Technologies, 2018, 1: 5-20.
|
[14] |
SONG X F, DONG C Y, YUAN D D, et al. Forward private searchable symmetric encryption with optimized I/O efficiency[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 17(5): 912-927.
|
[15] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[J]. Journal of Computer Security, 2011, 19(5): 895-934.
|
[16] |
WANG Q, GUO Y, HUANG H J, et al. Multi-user forward secure dynamic searchable symmetric encryption[C]//Proceedings of International Conference on Network and System Security. Cham: Springer, 2018: 125-140.
|
[17] |
BAKAS A, MICHALAS A. Multi-client symmetric searchable encryption with forward privacy[J]. Cryptology ePrint Archive, 2019, 2019: 813/1-15.
|
[18] |
CHEN T Y, XU P, WANG W, et al. Bestie: Very practical searchable encryption with forward and backward security[C]//European Symposium on Research in Computer Security. Cham: Springer, 2021: 3-23.
|
[19] |
RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.
|