Page 457 - 《软件学报》2025年第8期
P. 457

3880                                                       软件学报  2025  年第  36  卷第  8  期


                 Type-III 后向隐私以及鲁棒性. 详细的实验分析和评估表明相较于相关工作                    BDXT  和  ODXT, 方案  RFBC  是计算
                 和通信高效的. 未来, 我们将在现有方案的基础上进一步提升方案的安全性能. 同时, 我们也将继续探索基于其他
                 密码原语和工具, 以期在现有工作的基础上实现更多功能, 实现更为高效、安全的动态对称可加密搜索方案.

                 References:
                  [1]  Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Symp. on Security and
                     Privacy. Berkeley: IEEE, 2000. 44–55. [doi: 10.1109/SECPRI.2000.848445]
                  [2]  Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In: Proc. of the 2012 ACM Conf. on Computer and
                     Communications Security. Raleigh: ACM, 2012. 965–976. [doi: 10.1145/2382196.2382298]
                  [3]  Zhang YP, Katz J, Papamanthou C. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In:
                     Proc. of the 25th USENIX Conf. on Security Symp. Austin: USENIX Association, 2016. 707–720.
                  [4]  Stefanov E, Papamanthou C, Shi E. Practical dynamic searchable encryption with small leakage. In: Proc. of the 21st Annual Network
                     and Distributed System Security Symp. San Diego: NDSS, 2014. 23–26.
                  [5]  Huang  YC,  Li  SS,  Yu  B.  A  survey  of  symmetric  searchable  encryption  in  cloud  environment.  Journal  of  Electronics  &  Information
                     Technology, 2023, 45(3): 1134–1146 (in Chinese with English abstract). [doi: 10.11999/JEIT211572]
                  [6]  Wang YL, Chen XF. Research on searchable symmetric encryption. Journal of Electronics & Information Technology, 2020, 42(10):
                     2374–2385 (in Chinese with English abstract). [doi: 10.11999/JEIT190890]
                  [7]  Liu WX, Gao Y. A survey on security development of searchable symmetric encryption. Journal of Cyber Security, 2021, 6(2): 73–84 (in
                     Chinese with English abstract). [doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.05]
                  [8]  Asharov G, Segev G, Shahaf I. Tight tradeoffs in searchable symmetric encryption. Journal of Cryptology, 2021, 34(2): 9. [doi: 10.1007/
                     s00145-020-09370-z]
                  [9]  Goh EJ. Secure indexes. 2003. https://crypto.stanford.edu/~eujin/papers/secureindex/secureindex.pdf
                 [10]  Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In:
                     Proc.  of  the  13th  ACM  Conf.  on  Computer  and  Communications  Security.  Alexandria:  ACM,  2006.  79–88.  [doi:  10.1145/1180405.
                     1180417]
                 [11]  Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, Steiner M. Highly-scalable searchable symmetric encryption with support for Boolean
                     queries. In: Proc. of the 33rd Annual Cryptology Conf. Santa Barbara: Springer, 2013. 353–373. [doi: 10.1007/978-3-642-40041-4_20]
                 [12]  Lai  SQ,  Patranabis  S,  Sakzad  A,  Liu  JK,  Mukhopadhyay  D,  Steinfeld  R,  Sun  SF,  Liu  DX,  Zuo  C.  Result  pattern  hiding  searchable
                     encryption for conjunctive queries. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. Toronto:
                     ACM, 2018. 745–762. [doi: 10.1145/3243734.3243753]
                 [13]  Kamara  S,  Papamanthou  C.  Parallel  and  dynamic  searchable  symmetric  encryption.  In:  Proc.  of  the  17th  Int’l  Conf.  on  Financial
                     Cryptography and Data Security. Okinawa: Springer, 2013. 258–274. [doi: 10.1007/978-3-642-39884-1_22]
                 [14]  Bost R. ∑oφoς: Forward secure searchable encryption. In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications
                     Security. Vienna: ACM, 2016. 1143–1154. [doi: 10.1145/2976749.2978303]
                 [15]  Kim KS, Kim M, Lee D, Park JH, Kim WH. Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proc. of
                     the 2017 ACM SIGSAC Conf. on Computer and Communications Security. Dallas: ACM, 2017. 1449–1463. [doi: 10.1145/3133956.
                     3133970]
                 [16]  Etemad  M,  Küpçü  A,  Papamanthou  C,  Evans  D.  Efficient  dynamic  searchable  encryption  with  forward  privacy.  Proc.  on  Privacy
                     Enhancing Technologies, 2018, 2018(1): 5–20. [doi: 10.1515/popets-2018-0002]
                 [17]  Song XF, Dong CY, Yuan DD, Xu QL, Zhao MH. Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE
                     Trans. on Dependable and Secure Computing, 2020, 17(5): 912–927. [doi: 10.1109/TDSC.2018.2822294]
                 [18]  Zhang ZJ, Wang JF, Wang YL, Su YP, Chen XF. Towards efficient verifiable forward secure searchable symmetric encryption. In: Proc.
                     of the 24th European Symp. on Research in Computer Security. Luxembourg: Springer, 2019. 304–321. [doi: 10.1007/978-3-030-29962-
                     0_15]
                 [19]  Yang JJ, Liu F, Luo XY, Hong JN, Li J, Xue KP. Forward private multi-client searchable encryption with efficient access control in cloud
                     storage.  In:  Proc.  of  the  2022  IEEE  Global  Communications  Conf.  Rio  de  Janeiro:  IEEE,  2022.  3791–3796.  [doi:  10.1109/
                     GLOBECOM48099.2022.10001146]
                 [20]  Patranabis S, Mukhopadhyay D. Forward and backward private conjunctive searchable symmetric encryption. 2021. https://www.ndss-
                     symposium.org/wp-content/uploads/ndss2021_2C-3_23116_paper.pdf
   452   453   454   455   456   457   458   459   460   461   462