Page 457 - 《软件学报》2025年第8期
P. 457
3880 软件学报 2025 年第 36 卷第 8 期
Type-III 后向隐私以及鲁棒性. 详细的实验分析和评估表明相较于相关工作 BDXT 和 ODXT, 方案 RFBC 是计算
和通信高效的. 未来, 我们将在现有方案的基础上进一步提升方案的安全性能. 同时, 我们也将继续探索基于其他
密码原语和工具, 以期在现有工作的基础上实现更多功能, 实现更为高效、安全的动态对称可加密搜索方案.
References:
[1] Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Symp. on Security and
Privacy. Berkeley: IEEE, 2000. 44–55. [doi: 10.1109/SECPRI.2000.848445]
[2] Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In: Proc. of the 2012 ACM Conf. on Computer and
Communications Security. Raleigh: ACM, 2012. 965–976. [doi: 10.1145/2382196.2382298]
[3] Zhang YP, Katz J, Papamanthou C. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In:
Proc. of the 25th USENIX Conf. on Security Symp. Austin: USENIX Association, 2016. 707–720.
[4] Stefanov E, Papamanthou C, Shi E. Practical dynamic searchable encryption with small leakage. In: Proc. of the 21st Annual Network
and Distributed System Security Symp. San Diego: NDSS, 2014. 23–26.
[5] Huang YC, Li SS, Yu B. A survey of symmetric searchable encryption in cloud environment. Journal of Electronics & Information
Technology, 2023, 45(3): 1134–1146 (in Chinese with English abstract). [doi: 10.11999/JEIT211572]
[6] Wang YL, Chen XF. Research on searchable symmetric encryption. Journal of Electronics & Information Technology, 2020, 42(10):
2374–2385 (in Chinese with English abstract). [doi: 10.11999/JEIT190890]
[7] Liu WX, Gao Y. A survey on security development of searchable symmetric encryption. Journal of Cyber Security, 2021, 6(2): 73–84 (in
Chinese with English abstract). [doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.05]
[8] Asharov G, Segev G, Shahaf I. Tight tradeoffs in searchable symmetric encryption. Journal of Cryptology, 2021, 34(2): 9. [doi: 10.1007/
s00145-020-09370-z]
[9] Goh EJ. Secure indexes. 2003. https://crypto.stanford.edu/~eujin/papers/secureindex/secureindex.pdf
[10] Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In:
Proc. of the 13th ACM Conf. on Computer and Communications Security. Alexandria: ACM, 2006. 79–88. [doi: 10.1145/1180405.
1180417]
[11] Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, Steiner M. Highly-scalable searchable symmetric encryption with support for Boolean
queries. In: Proc. of the 33rd Annual Cryptology Conf. Santa Barbara: Springer, 2013. 353–373. [doi: 10.1007/978-3-642-40041-4_20]
[12] Lai SQ, Patranabis S, Sakzad A, Liu JK, Mukhopadhyay D, Steinfeld R, Sun SF, Liu DX, Zuo C. Result pattern hiding searchable
encryption for conjunctive queries. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. Toronto:
ACM, 2018. 745–762. [doi: 10.1145/3243734.3243753]
[13] Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption. In: Proc. of the 17th Int’l Conf. on Financial
Cryptography and Data Security. Okinawa: Springer, 2013. 258–274. [doi: 10.1007/978-3-642-39884-1_22]
[14] Bost R. ∑oφoς: Forward secure searchable encryption. In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications
Security. Vienna: ACM, 2016. 1143–1154. [doi: 10.1145/2976749.2978303]
[15] Kim KS, Kim M, Lee D, Park JH, Kim WH. Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proc. of
the 2017 ACM SIGSAC Conf. on Computer and Communications Security. Dallas: ACM, 2017. 1449–1463. [doi: 10.1145/3133956.
3133970]
[16] Etemad M, Küpçü A, Papamanthou C, Evans D. Efficient dynamic searchable encryption with forward privacy. Proc. on Privacy
Enhancing Technologies, 2018, 2018(1): 5–20. [doi: 10.1515/popets-2018-0002]
[17] Song XF, Dong CY, Yuan DD, Xu QL, Zhao MH. Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE
Trans. on Dependable and Secure Computing, 2020, 17(5): 912–927. [doi: 10.1109/TDSC.2018.2822294]
[18] Zhang ZJ, Wang JF, Wang YL, Su YP, Chen XF. Towards efficient verifiable forward secure searchable symmetric encryption. In: Proc.
of the 24th European Symp. on Research in Computer Security. Luxembourg: Springer, 2019. 304–321. [doi: 10.1007/978-3-030-29962-
0_15]
[19] Yang JJ, Liu F, Luo XY, Hong JN, Li J, Xue KP. Forward private multi-client searchable encryption with efficient access control in cloud
storage. In: Proc. of the 2022 IEEE Global Communications Conf. Rio de Janeiro: IEEE, 2022. 3791–3796. [doi: 10.1109/
GLOBECOM48099.2022.10001146]
[20] Patranabis S, Mukhopadhyay D. Forward and backward private conjunctive searchable symmetric encryption. 2021. https://www.ndss-
symposium.org/wp-content/uploads/ndss2021_2C-3_23116_paper.pdf

