Page 459 - 《软件学报》2025年第8期
P. 459

3882                                                       软件学报  2025  年第  36  卷第  8  期


                 [42]  Chen TY, Xu P, Wang W, Zheng YB, Susilo W, Jin H. Bestie: Very practical searchable encryption with forward and backward security.
                     In: Proc. of the 26th European Symp. on Research in Computer Security. Darmstadt: Springer, 2021. 3–23. [doi: 10.1007/978-3-030-
                     88428-4_1]
                 [43]  Zuo C, Sun SF, Liu JK, Shao J, Pieprzyk J, Xu L. Forward and backward private DSSE for range queries. IEEE Trans. on Dependable
                     and Secure Computing, 2022, 19(1): 328–338. [doi: 10.1109/TDSC.2020.2994377]
                 [44]  Wang XY, Ma JF, Liu XM, Miao YB, Liu Y, Deng RH. Forward/backward and content private DSSE for spatial keyword queries. IEEE
                     Trans. on Dependable and Secure Computing, 2023, 20(4): 3358–3370. [doi: 10.1109/TDSC.2022.3205670]
                 [45]  Xu L, Duan HY, Zhou AX, Yuan XL, Wang C. Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption.
                     IEEE Trans. on Information Forensics and Security, 2021, 16: 5310–5325. [doi: 10.1109/TIFS.2021.3128823]
                 [46]  Chamani JG, Papadopoulos D, Karbasforushan M, Demertzis I. Dynamic searchable encryption with optimal search in the presence of
                     deletions. In: Proc. of the 31st USENIX Security Symp. USENIX Association, 2022. 2425–2442.
                 [47]  Jiang Q, Chang EC, Qi Y, Qi SY, Wu PF, Wang JF. Rphx: Result pattern hiding conjunctive query over private compressed index using
                     Intel SGX. IEEE Trans. on Information Forensics and Security, 2022, 17: 1053–1068. [doi: 10.1109/TIFS.2022.3144877]
                 [48]  Xu C, Wang RJ, Zhu LH, Zhang C, Lu RX, Sharif K. Efficient strong privacy-preserving conjunctive keyword search over encrypted
                     cloud data. IEEE Trans. on Big Data, 2023, 9(3): 805–817. [doi: 10.1109/TBDATA.2022.3205668]
                 [49]  Bloom BH. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422–426. [doi: 10.
                     1145/362686.362692]
                 [50]  Feng DG. Research on theory and approach of provable security. Ruan Jian Xue Bao/Journal of Software, 2005, 16(10): 1743–1756 (in
                     Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/1743.htm

                 附中文参考文献:
                  [5]  黄一才, 李森森, 郁滨. 云环境下对称可搜索加密研究综述. 电子与信息学报, 2023, 45(3): 1134–1146. [doi: 10.11999/JEIT211572]
                  [6]  王贇玲, 陈晓峰. 对称可搜索加密技术研究进展. 电子与信息学报, 2020, 42(10): 2374–2385. [doi: 10.11999/JEIT190890]
                  [7]  刘文心, 高莹. 对称可搜索加密的安全性研究进展. 信息安全学报, 2021, 6(2): 73–84. [doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.05]
                 [50]  冯登国. 可证明安全性理论与方法研究. 软件学报, 2005, 16(10): 1743–1756. http://www.jos.org.cn/1000-9825/16/1743.htm

                             张文琪(1999-), 男, 博士生, 主要研究领域为隐                 梁伟(1978-), 男, 博士, 教授, 博士生导师, CCF
                            私计算.                                         高级会员, 主要研究领域为网络安全, 区块链.




                             李雄(1984-), 男, 博士, 教授, 博士生导师, CCF             黄可(1989-), 男, 博士, 副教授, CCF  专业会员,
                            高级会员, 主要研究领域为应用密码学, 数据安                      主要研究领域为区块链, 应用密码学.
                            全, 隐私计算.



                             尹智明(1995-), 男, 硕士, 主要研究领域为密码                 张小松(1968-), 男, 博士, 教授, 博士生导师,
                            协议, 隐私计算.                                    CCF  会士, 主要研究领域为网络安全, 卫星互联
                                                                         网安全, 区块链.
   454   455   456   457   458   459   460   461   462   463   464