共 23 条
- [1] DONG X L, ZHOU J, CAO Z F., Research advances on secure searchable encryption, Journal of Computer Research and Development, 54, 10, pp. 2107-2120, (2017)
- [2] SONG D X, WAGNER D, PERRIG A., Practical techniques for searches on encrypted data, Proceedings of IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
- [3] WU Z Q, LI K L, ZHENG H., Efficient and scalable architecture for searchable symmetric encryption, Journal on Communications, 38, 8, pp. 79-93, (2017)
- [4] DU R Z, TAN A L, TIAN J F., Public key searchable encryption scheme based on blockchain, Journal on Communications, 41, 4, pp. 114-122, (2020)
- [5] KAMARA S, PAPAMANTHOU C, ROEDER T., Dynamic searchable symmetric encryption, Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965-976, (2012)
- [6] STEFANOV E, PAPAMANTHOU C, SHI E., Practical dynamic searchable encryption with small leakage, Proceedings 2014 Network and Distributed System Security Symposium, pp. 72-75, (2014)
- [7] BOST R, MINAUD B, OHRIMENKO O., Forward and backward private searchable encryption from constrained cryptographic primitives, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465-1482, (2017)
- [8] CASH D, GRUBBS P, PERRY J, Et al., Leakage-abuse attacks against searchable encryption, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668-679, (2015)
- [9] ZHANG Y P, KATZ J, PAPAMANTHOU C., All your queries are belong to us: the power of file-injection attacks on searchable encryption, IACR Cryptology EPrint Archive, (2016)
- [10] BOST R., ∑oφoς: forward secure searchable encryption, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1143-1154, (2016)