Page 459 - 《软件学报》2025年第8期
P. 459
3882 软件学报 2025 年第 36 卷第 8 期
[42] Chen TY, Xu P, Wang W, Zheng YB, Susilo W, Jin H. Bestie: Very practical searchable encryption with forward and backward security.
In: Proc. of the 26th European Symp. on Research in Computer Security. Darmstadt: Springer, 2021. 3–23. [doi: 10.1007/978-3-030-
88428-4_1]
[43] Zuo C, Sun SF, Liu JK, Shao J, Pieprzyk J, Xu L. Forward and backward private DSSE for range queries. IEEE Trans. on Dependable
and Secure Computing, 2022, 19(1): 328–338. [doi: 10.1109/TDSC.2020.2994377]
[44] Wang XY, Ma JF, Liu XM, Miao YB, Liu Y, Deng RH. Forward/backward and content private DSSE for spatial keyword queries. IEEE
Trans. on Dependable and Secure Computing, 2023, 20(4): 3358–3370. [doi: 10.1109/TDSC.2022.3205670]
[45] Xu L, Duan HY, Zhou AX, Yuan XL, Wang C. Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption.
IEEE Trans. on Information Forensics and Security, 2021, 16: 5310–5325. [doi: 10.1109/TIFS.2021.3128823]
[46] Chamani JG, Papadopoulos D, Karbasforushan M, Demertzis I. Dynamic searchable encryption with optimal search in the presence of
deletions. In: Proc. of the 31st USENIX Security Symp. USENIX Association, 2022. 2425–2442.
[47] Jiang Q, Chang EC, Qi Y, Qi SY, Wu PF, Wang JF. Rphx: Result pattern hiding conjunctive query over private compressed index using
Intel SGX. IEEE Trans. on Information Forensics and Security, 2022, 17: 1053–1068. [doi: 10.1109/TIFS.2022.3144877]
[48] Xu C, Wang RJ, Zhu LH, Zhang C, Lu RX, Sharif K. Efficient strong privacy-preserving conjunctive keyword search over encrypted
cloud data. IEEE Trans. on Big Data, 2023, 9(3): 805–817. [doi: 10.1109/TBDATA.2022.3205668]
[49] Bloom BH. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422–426. [doi: 10.
1145/362686.362692]
[50] Feng DG. Research on theory and approach of provable security. Ruan Jian Xue Bao/Journal of Software, 2005, 16(10): 1743–1756 (in
Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/1743.htm
附中文参考文献:
[5] 黄一才, 李森森, 郁滨. 云环境下对称可搜索加密研究综述. 电子与信息学报, 2023, 45(3): 1134–1146. [doi: 10.11999/JEIT211572]
[6] 王贇玲, 陈晓峰. 对称可搜索加密技术研究进展. 电子与信息学报, 2020, 42(10): 2374–2385. [doi: 10.11999/JEIT190890]
[7] 刘文心, 高莹. 对称可搜索加密的安全性研究进展. 信息安全学报, 2021, 6(2): 73–84. [doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.05]
[50] 冯登国. 可证明安全性理论与方法研究. 软件学报, 2005, 16(10): 1743–1756. http://www.jos.org.cn/1000-9825/16/1743.htm
张文琪(1999-), 男, 博士生, 主要研究领域为隐 梁伟(1978-), 男, 博士, 教授, 博士生导师, CCF
私计算. 高级会员, 主要研究领域为网络安全, 区块链.
李雄(1984-), 男, 博士, 教授, 博士生导师, CCF 黄可(1989-), 男, 博士, 副教授, CCF 专业会员,
高级会员, 主要研究领域为应用密码学, 数据安 主要研究领域为区块链, 应用密码学.
全, 隐私计算.
尹智明(1995-), 男, 硕士, 主要研究领域为密码 张小松(1968-), 男, 博士, 教授, 博士生导师,
协议, 隐私计算. CCF 会士, 主要研究领域为网络安全, 卫星互联
网安全, 区块链.

