Page 458 - 《软件学报》2025年第8期
P. 458

张文琪 等: 鲁棒的前后向隐私联合对称可搜索加密方案                                                      3881


                 [21]  Yuan  DD,  Cui  SJ,  Russello  G.  We  can  make  mistakes:  Fault-tolerant  forward  private  verifiable  dynamic  searchable  symmetric
                     encryption. In: Proc. of the 7th IEEE European Symp. on Security and Privacy (EuroS&P). Genoa: IEEE, 2022. 587–605. [doi: 10.1109/
                     EuroSP53844.2022.00043]
                 [22]  Mei L, Xu CG, Xu L, Yuan XL, Liu JK. Practical multi-source multi-client searchable encryption with forward privacy: Refined security
                     notion  and  new  constructions.  IEEE  Trans.  on  Dependable  and  Secure  Computing,  2024,  21(1):  63–77.  [doi:  10.1109/TDSC.2023.
                     3245638]
                 [23]  Kamara S, Moataz T. Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Proc. of the 36th Annual Int’l
                     Conf. on the Theory and Applications of Cryptographic Techniques. Paris: Springer, 2017. 94–124. [doi: 10.1007/978-3-319-56617-7_4]
                 [24]  Wang YL, Wang JF, Sun SF, Miao MX, Chen XF. Toward forward secure SSE supporting conjunctive keyword search. IEEE Access,
                     2019, 7: 142762–142772. [doi: 10.1109/ACCESS.2019.2944246]
                 [25]  Bost R, Minaud B, Ohrimenko O. Forward and backward private searchable encryption from constrained cryptographic primitives. In:
                     Proc. of the 2017 ACM SIGSAC Conf. on Computer and Communications Security. Dallas: ACM, 2017. 1465–1482. [doi: 10.1145/
                     3133956.3133980]
                 [26]  Sun SF, Yuan XL, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S. Practical backward-secure searchable encryption from symmetric
                     puncturable encryption. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. Toronto: ACM, 2018.
                     763–780. [doi: 10.1145/3243734.3243782]
                 [27]  Chamani  JG,  Papadopoulos  D,  Papamanthou  C,  Jalili  R.  New  constructions  for  forward  and  backward  private  symmetric  searchable
                     encryption. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. Toronto: ACM, 2018. 1038–1055.
                     [doi: 10.1145/3243734.3243833]
                 [28]  Hoang T, Yavuz AA, Guajardo J. A secure searchable encryption framework for privacy-critical cloud storage services. IEEE Trans. on
                     Services Computing, 2021, 14(6): 1675–1689. [doi: 10.1109/TSC.2019.2897096]
                 [29]  He K, Chen J, Zhou QX, Du RY, Xiang Y. Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE
                     Trans. on Information Forensics and Security, 2021, 16: 1538–1549. [doi: 10.1109/TIFS.2020.3033412]
                 [30]  Demertzis I, Chamani JG, Papadopoulos D, Papamanthou C. Dynamic searchable encryption with small client storage. In: Proc. of the
                     27th Annual Network and Distributed System Security Symp. San Diego: NDSS, 2020.
                 [31]  Sun SF, Steinfeld R, Lai SQ, Yuan XL, Sakzad A, Liu JK, Nepal S, Gu DW. Practical non-interactive searchable encryption with forward
                     and backward privacy. In: Proc. of the 28th Annual Network and Distributed System Security Symp. NDSS. 2021.
                 [32]  Vo V, Lai SQ, Yuan XL, Nepal S, Liu JK. Towards efficient and strong backward private searchable encryption with secure enclaves. In:
                     Proc. of the 19th Int’l Conf. on Applied Cryptography and Network Security. Kamakura: Springer, 2021. 50–75. [doi: 10.1007/978-3-030-
                     78372-3_3]
                 [33]  Vo V, Lai SQ, Yuan XL, Sun SF, Nepal S, Liu JK. Accelerating forward and backward private searchable encryption using trusted
                     execution. In: Proc. of the 18th Int’l Conf. on Applied Cryptography and Network Security. Rome: Springer, 2020. 83–103. [doi: 10.1007/
                     978-3-030-57878-7_5]
                 [34]  Amjad  G,  Kamara  S,  Moataz  T.  Forward  and  backward  private  searchable  encryption  with  SGX.  In:  Proc.  of  the  12th  European
                     Workshop on Systems Security. Dresden: ACM, 2019. 4. [doi: 10.1145/3301417.3312496]
                 [35]  Huang  YY,  Lv  SY,  Liu  ZL,  Song  XF,  Li  J,  Yuan  YL,  Dong  CY.  Cetus:  An  efficient  symmetric  searchable  encryption  against  file-
                     injection attack with SGX. Science China Information Sciences, 2021, 64(8): 182314. [doi: 10.1007/s11432-020-3039-x]
                 [36]  Zuo C, Sun SF, Liu JK, Shao J, Pieprzyk J. Dynamic searchable symmetric encryption with forward and stronger backward privacy. In:
                     Proc. of the 24th European Symp. on Research in Computer Security. Luxembourg: Springer, 2019. 283–303. [doi: 10.1007/978-3-030-
                     29962-0_14]
                 [37]  Wu ZQ, Cai ZB, Tang XY, Xu YM, Deng T. A forward and backward private oblivious RAM for storage outsourcing on edge-cloud
                     computing. Journal of Parallel and Distributed Computing, 2022, 166: 1–14. [doi: 10.1016/j.jpdc.2022.04.008]
                 [38]  Stefanov E, Van Dijk M, Shi E, Chan THH, Fletcher C, Ren L, Yu XY, Devadas S. Path ORAM: An extremely simple oblivious RAM
                     protocol. Journal of the ACM (JACM), 2018, 65(4): 18. [doi: 10.1145/3177872]
                 [39]  Li J, Huang YY, Wei Y, Lv SY, Liu ZL, Dong CY, Luo WJ. Searchable symmetric encryption with forward search privacy. IEEE Trans.
                     on Dependable and Secure Computing, 2021, 18(1): 460–474. [doi: 10.1109/TDSC.2019.2894411]
                 [40]  Xu  P,  Susilo  W,  Wang  W,  Chen  TY,  Wu  QH,  Liang  KT,  Jin  H.  ROSE:  Robust  searchable  encryption  with  forward  and  backward
                     security. IEEE Trans. on Information Forensics and Security, 2022, 17: 1115–1130. [doi: 10.1109/TIFS.2022.3155977]
                 [41]  Zuo C, Lai SQ, Yuan XL, Liu JK, Shao J, Wang HX. Searchable encryption for conjunctive queries with extended forward and backward
                     privacy. IACR Cryptology ePrint Archive, 2021, 2021: 1585.
   453   454   455   456   457   458   459   460   461   462   463