Page 458 - 《软件学报》2025年第8期
P. 458
张文琪 等: 鲁棒的前后向隐私联合对称可搜索加密方案 3881
[21] Yuan DD, Cui SJ, Russello G. We can make mistakes: Fault-tolerant forward private verifiable dynamic searchable symmetric
encryption. In: Proc. of the 7th IEEE European Symp. on Security and Privacy (EuroS&P). Genoa: IEEE, 2022. 587–605. [doi: 10.1109/
EuroSP53844.2022.00043]
[22] Mei L, Xu CG, Xu L, Yuan XL, Liu JK. Practical multi-source multi-client searchable encryption with forward privacy: Refined security
notion and new constructions. IEEE Trans. on Dependable and Secure Computing, 2024, 21(1): 63–77. [doi: 10.1109/TDSC.2023.
3245638]
[23] Kamara S, Moataz T. Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Proc. of the 36th Annual Int’l
Conf. on the Theory and Applications of Cryptographic Techniques. Paris: Springer, 2017. 94–124. [doi: 10.1007/978-3-319-56617-7_4]
[24] Wang YL, Wang JF, Sun SF, Miao MX, Chen XF. Toward forward secure SSE supporting conjunctive keyword search. IEEE Access,
2019, 7: 142762–142772. [doi: 10.1109/ACCESS.2019.2944246]
[25] Bost R, Minaud B, Ohrimenko O. Forward and backward private searchable encryption from constrained cryptographic primitives. In:
Proc. of the 2017 ACM SIGSAC Conf. on Computer and Communications Security. Dallas: ACM, 2017. 1465–1482. [doi: 10.1145/
3133956.3133980]
[26] Sun SF, Yuan XL, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S. Practical backward-secure searchable encryption from symmetric
puncturable encryption. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. Toronto: ACM, 2018.
763–780. [doi: 10.1145/3243734.3243782]
[27] Chamani JG, Papadopoulos D, Papamanthou C, Jalili R. New constructions for forward and backward private symmetric searchable
encryption. In: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security. Toronto: ACM, 2018. 1038–1055.
[doi: 10.1145/3243734.3243833]
[28] Hoang T, Yavuz AA, Guajardo J. A secure searchable encryption framework for privacy-critical cloud storage services. IEEE Trans. on
Services Computing, 2021, 14(6): 1675–1689. [doi: 10.1109/TSC.2019.2897096]
[29] He K, Chen J, Zhou QX, Du RY, Xiang Y. Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE
Trans. on Information Forensics and Security, 2021, 16: 1538–1549. [doi: 10.1109/TIFS.2020.3033412]
[30] Demertzis I, Chamani JG, Papadopoulos D, Papamanthou C. Dynamic searchable encryption with small client storage. In: Proc. of the
27th Annual Network and Distributed System Security Symp. San Diego: NDSS, 2020.
[31] Sun SF, Steinfeld R, Lai SQ, Yuan XL, Sakzad A, Liu JK, Nepal S, Gu DW. Practical non-interactive searchable encryption with forward
and backward privacy. In: Proc. of the 28th Annual Network and Distributed System Security Symp. NDSS. 2021.
[32] Vo V, Lai SQ, Yuan XL, Nepal S, Liu JK. Towards efficient and strong backward private searchable encryption with secure enclaves. In:
Proc. of the 19th Int’l Conf. on Applied Cryptography and Network Security. Kamakura: Springer, 2021. 50–75. [doi: 10.1007/978-3-030-
78372-3_3]
[33] Vo V, Lai SQ, Yuan XL, Sun SF, Nepal S, Liu JK. Accelerating forward and backward private searchable encryption using trusted
execution. In: Proc. of the 18th Int’l Conf. on Applied Cryptography and Network Security. Rome: Springer, 2020. 83–103. [doi: 10.1007/
978-3-030-57878-7_5]
[34] Amjad G, Kamara S, Moataz T. Forward and backward private searchable encryption with SGX. In: Proc. of the 12th European
Workshop on Systems Security. Dresden: ACM, 2019. 4. [doi: 10.1145/3301417.3312496]
[35] Huang YY, Lv SY, Liu ZL, Song XF, Li J, Yuan YL, Dong CY. Cetus: An efficient symmetric searchable encryption against file-
injection attack with SGX. Science China Information Sciences, 2021, 64(8): 182314. [doi: 10.1007/s11432-020-3039-x]
[36] Zuo C, Sun SF, Liu JK, Shao J, Pieprzyk J. Dynamic searchable symmetric encryption with forward and stronger backward privacy. In:
Proc. of the 24th European Symp. on Research in Computer Security. Luxembourg: Springer, 2019. 283–303. [doi: 10.1007/978-3-030-
29962-0_14]
[37] Wu ZQ, Cai ZB, Tang XY, Xu YM, Deng T. A forward and backward private oblivious RAM for storage outsourcing on edge-cloud
computing. Journal of Parallel and Distributed Computing, 2022, 166: 1–14. [doi: 10.1016/j.jpdc.2022.04.008]
[38] Stefanov E, Van Dijk M, Shi E, Chan THH, Fletcher C, Ren L, Yu XY, Devadas S. Path ORAM: An extremely simple oblivious RAM
protocol. Journal of the ACM (JACM), 2018, 65(4): 18. [doi: 10.1145/3177872]
[39] Li J, Huang YY, Wei Y, Lv SY, Liu ZL, Dong CY, Luo WJ. Searchable symmetric encryption with forward search privacy. IEEE Trans.
on Dependable and Secure Computing, 2021, 18(1): 460–474. [doi: 10.1109/TDSC.2019.2894411]
[40] Xu P, Susilo W, Wang W, Chen TY, Wu QH, Liang KT, Jin H. ROSE: Robust searchable encryption with forward and backward
security. IEEE Trans. on Information Forensics and Security, 2022, 17: 1115–1130. [doi: 10.1109/TIFS.2022.3155977]
[41] Zuo C, Lai SQ, Yuan XL, Liu JK, Shao J, Wang HX. Searchable encryption for conjunctive queries with extended forward and backward
privacy. IACR Cryptology ePrint Archive, 2021, 2021: 1585.

