Computer Science ›› 2024, Vol. 51 ›› Issue (3): 340-350.doi: 10.11896/jsjkx.230100016
• Information Security • Previous Articles Next Articles
XU Chengzhi1, XU Lei2, XU Chungen2
CLC Number:
[1]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Sympo-sium on Security and Privacy.California:IEEE Computer Society,2000:44-55. [2]BONEH D,CRESCENZO G D,OSTROVSKY R,et al.Publickey encryption with keyword search[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Interlaken:Springer,2004:506-522. [3]XU L,XU C G,YU X L.Secure and Efficient Data Retrieval Scheme Using Searchable Encryption in Cloud[J].Journal of Cryptologic Research.2016,3(4):330-339. [4]KAMARA S,PAPAMANTHOU C.Parallel and dynamic sear-chable symmetric encryption[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Okinawa:Springer,2013:258-274. [5]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:improved definitions and efficient constructions[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria:ACM,2006:79-88. [6]ISLAM M S,KUZU M,KANTARCIOGLU M.Access pattern disclosure on searchable encryption:ramification,attack and mi-tigation[C]//Proceedings of Annual Network and Distributed System Security Symposium.San Diego:The Internet Society,2012. [7]LIU C,ZHU L,WANG M,et al.Search pattern leakage insearchable encryption:Attacks and new construction[J].Information Sciences,2014,265:176-188. [8]OYA S,KERSCHBAUM F.Hiding the access pattern is notenough:Exploiting search pattern leakage in searchable encryption[C]//Proceedings of USENIX Security Symposium.USENIX Association,2021:127-142. [9]ZHANG Y,KATZ J,PAPAMANTHOU C.All your queries are belong to us:the power of File-Injection attacks on searchable encryption[C]//Proceedings of USENIX Security Symposium.Austin:USENIX Association,2016:707-720. [10]BONEH D,LEWI K,MONTGOMERY H,et al.Key homomorphic PRFs and their applications[C]//Proceedings of Annual Cryptology Conference.Santa Barbara:Springer,2013:410-428. [11]GOH E J.Secure indexes[J/OL].http://eprint.iacr.org/2003/216. [12]STEFANOV E,PAPAMANTHOU C,SHI E.Practical dynamic searchable encryption with small leakage[C]//Proceedings of Annual Network and Distributed System Security Symposium.The Internet Society,2014:72-75. [13]GOLDREICH O,OSTROVSKY R.Software protection andsimulation on oblivious RAMs[J].Journal of the ACM(JACM),1996,43(3):431-473. [14]HE K,CHEN J,ZHOU Q,et al.Secure dynamic searchablesymmetric encryption with constant client storage cost[J].IEEE Transactions on Information Forensics and Security,2020,16:1538-1549. [15]CHEN T,XU P,WANG W,et al.Bestie:Very practical sear-chable encryption with forward and backward security[C]//Proceedings of European Symposium on Research in Computer Security.Darmstadt:Springer,2021:3-23. [16]BOST R,MINAUD B,OHRIMENKO O.Forward and back-ward private searchable encryption from constrained cryptographic primitives[C]//Proceedings of ACM SIGSAC Confe-rence on Computer and Communications Security.Dallas:ACM,2017:1465-1482. [17]SUN S F,YUAN X,LIU J K,et al.Practical backward-secure searchable encryption from symmetric puncturable encryption[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.Toronto:ACM,2018:763-780. [18]SUN S F,STEINFELD R,LAI S,et al.Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy[C]//Proceedings of Annual Network and Distributed System Security Symposium.The Internet Society,2021. [19]WANG Y L,CHEN X F.Research on Searchable Symmetric Encryption[J].Journal of Electronics & Information Technology,2020,42(10):2374-2385. [20]LU B J,ZHOU J,CAO Z F.A multi-user forward secure dynamic symmetric searchable encryption with enhanced security [J].Journal of Computer Research and Development,2020,57(10):2104-2116. [21]CASH D,JARECKI S,JUTLA C,et al.Highly-scalable sear-chable symmetric encryption with support for boolean queries[C]//Proceedings of Annual Cryptology Conference.Santa Barbara:Springer,2013:353-373. [22]XU L,YUAN X L,ZHENG X Z,et al.Towards efficient cryptographic data validation service in edge computing[J].IEEE Transactions on Services Computing,2021,16(1):656-669. [23]CASH D,GRUBBS P,PERRY J,et al.Leakage-abuse attacksagainst searchable encryption[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.Denver:ACM,2015:668-679. [24]OYA S,KERSCHBAUM F.IHOP:Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization[C]//Proceedings of USENIX Security Symposium.Boston:USENIX Association,2022:2407-2424. [25]DAMIE M,HAHN F,PETER A.A Highly Accurate Query-Recovery Attack againstSearchable Encryption using Non-Indexed Documents[C]//Proceedings of USENIX Security Symposium.USENIX Association,2021:143-160. [26]XU L,DUAN H,ZHOU A,et al.Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption[J].IEEE Transactions on Information Forensics and Security,2021,16:5310-5325. [27]CHEN G,LAI T H,REITER M K,et al.Differentially private access patterns for searchable symmetric encryption[C]//Proceedings of IEEE Conference on Computer Communications.Honolulu:IEEE,2018:810-818. [28]KAMARA S,MOATAZ T.Computationally volume-hidingstructured encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Darmstadt:Springer,2019:183-213. [29]GRUBBS P,KHANDELWAL A,LACHARITÉ M S,et al.Pancake:Frequency smoothing for encrypted data stores[C]//Proceedings of USENIX Security Symposium.USENIX Association,2020:2451-2468. [30]ZHAO Z T,XU Y,SONG X F,et al.A Multi-Pattern Hiding Dynamic Symmetric Searchable Encryption Based on Differential Privacy[J].Journal of Computer Research and Development,2021,58(10):2287-2300. [31]ZHENG W,DAVE A,BEEKMAN J G,et al.Opaque:An obli-vious and encrypted distributed analytics platform[C]//Procee-dings of USENIX Symposium on Networked Systems Design and Implementation.Boston:USENIX Association,2017:283-298. [32]EVERSPAUGH A,PATERSON K,RISTENPART T,et al.Key rotation for authenticated encryption[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara:Springer,2017:98-129. [33]LEHMANN A,TACKMANN B.Updatable encryption withpost-compromise security[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tel Aviv:Springer,2018:685-716. [34]KLOOß M,LEHMANN A,RUPP A.(R) CCA secure updatable encryption with integrity protection[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Darmstadt:Springer,2019:68-99. [35]BOYD C,DAVIES G T,GJØSTEEN K,et al.Fast and secure updatable encryption[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara:Springer,2020:464-493. [36]SONG X F,DONG C,YUAN D,et al.Forward private searchable symmetric encryption with optimized I/O efficiency[J].IEEE Transactions on Dependable and Secure Computing,2018,17(5):912-927. |
[1] | PANG Yuxiang, CHEN Zemao. Security Scheme of UAV Flight Control Based on Attribute Access Control Policy [J]. Computer Science, 2024, 51(4): 366-372. |
[2] | WANG Degang, SUN Yi, GAO Qi. Active Membership Inference Attack Method Based on Multiple Redundant Neurons [J]. Computer Science, 2024, 51(4): 373-380. |
[3] | HE Jiaojun, CAI Manchun, LU Tianliang. Android Malware Detection Method Based on GCN and BiLSTM [J]. Computer Science, 2024, 51(4): 388-395. |
[4] | WANG Xin, HUANG Weikou, SUN Lingyun. Survey of Incentive Mechanism for Cross-silo Federated Learning [J]. Computer Science, 2024, 51(3): 20-29. |
[5] | CAI Mengnan, SHEN Guohua, HUANG Zhiqiu, YANG Yang. High-dimensional Data Publication Under Local Differential Privacy [J]. Computer Science, 2024, 51(2): 322-332. |
[6] | LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun. Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms [J]. Computer Science, 2024, 51(2): 333-342. |
[7] | XIE Qiong, WANG Weiqiong, XU Haojie. Secure Multiparty Computation of Set Intersection and Union [J]. Computer Science, 2024, 51(2): 371-377. |
[8] | MA Zongshuai, WU Zehui, YAN Chenyu, WEI Qiang. Survey of Vulnerability Benchmark Construction Technique [J]. Computer Science, 2024, 51(1): 316-326. |
[9] | WANG Zhousheng, YANG Geng, DAI Hua. Lightweight Differential Privacy Federated Learning Based on Gradient Dropout [J]. Computer Science, 2024, 51(1): 345-354. |
[10] | WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370. |
[11] | GUO Caicai, JIN Yu. CASESC:A Cloud Auditing Scheme Based on Ethereum Smart Contracts [J]. Computer Science, 2023, 50(12): 368-376. |
[12] | WU Tong, ZHOU Dawei, OU Qingyu, CHU Weiyu. Review of Relationship Between Side-channel Attacks and Fault Attacks [J]. Computer Science, 2023, 50(11A): 220700223-7. |
[13] | SUN Min, SHAN Tong, XU Senwei. Hybrid Encryption Algorithm Based on I-SM4 and SM2 [J]. Computer Science, 2023, 50(11A): 221100116-4. |
[14] | ZHANG Xuejun, YANG Yixing, LI Jiale, TIAN Feng, HUANG Haiyan, HUANG Shan. Dummy Location Generation Algorithm Against Side Information Inference Attack [J]. Computer Science, 2023, 50(11A): 221000036-9. |
[15] | WANG Zichen, YUAN Chengsheng, WANG Yili, GUO Ping, FU Zhangjie. Lightweight Group Key Agreement for Industrial Internet of Things [J]. Computer Science, 2023, 50(11A): 230700075-10. |
|