How to retrieve the encrypted data on the blockchain |
Li, Huige
(School of Data and Computer Science, Sun Yat-sen University)
Zhang, Fangguo (School of Data and Computer Science, Sun Yat-sen University) Luo, Peiran (School of Data and Computer Science, Sun Yat-sen University) Tian, Haibo (School of Data and Computer Science, Sun Yat-sen University) He, Jiejie (School of Data and Computer Science, Sun Yat-sen University) |
1 | E. Stefanov, C. Papamanthou, and E. Shi, "Practical dynamic searchable encryption with small leakage," NDSS, volume 14, pages 23-26, 2014. |
2 | R. Bost, P. A. Fouque, and D. Pointcheval, "Verifiable dynamic symmetric searchable encryption: Optimality and forward security," IACR Cryptology ePrint Archive, 2016:62, 2016. http://eprint.iacr.org/2016/062 |
3 |
R. Bost, " |
4 | S. Kamara, C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," in Proc. of International Conference on Financial Cryptography and Data Security, Springer, pages 258-274, 2013. |
5 | J. Alderman, K. Martin, and S. Louise Renwick, "Multi-level access in searchable symmetric encryption," in Proc. of International Conference on Financial Cryptography and Data Security, Springer, pages 35-52, 2017. |
6 | C. Bosch, P. Hartel, W. Jonker, and et al., "A survey of provably secure searchable encryption," ACM Computing Surveys (CSUR), 47(2), 18, 2015. |
7 | K. Kurosawa and Y. Ohtaki, "UC-secure searchable symmetric encryption," Financial Cryptography and Data Security, Springer, pages 285-298, 2012. |
8 | R. Cheng, J. Yan, C. Guan, and et al., "Verifiable searchable symmetric encryption from indistinguishability obfuscation," in Proc. of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pages 621-626, Singapore, April 14-17, 2015. |
9 | S. G. Dai, H. G. Li, and F. G. Zhang, "Memory leakage-resilient searchable symmetric encryption," Future Generation Comp. Syst., 62, 76-84, 2016. DOI |
10 | D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of 2000 IEEE Symposium on Security and Privacy, IEEE, pages 44-55, 2000. |
11 | E. J. Goh, "Secure indexes," IACR Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/216 |
12 | R. Curtmola, J. A. Garay, S. Kamara, and et al., "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of the 13th ACM conference on Computer and communications security, ACM, pages 79-88, 2006. |
13 | P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," International Conference on Applied Cryptography and Network Security, Springer, pages 31-45, 2004. |
14 | T. Moataz and A. Shikfa, "Boolean symmetric searchable encryption," in Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, ACM, pages 265-276, 2013. |
15 | D. Cash, S. Jarecki, C. S. Jutla, and so on, "Highly-scalable searchable symmetric encryption with support for boolean queries," Advances in Cryptology-CRYPTO 2013, Springer, pages 353-373, 2013. |
16 | S. Kamara, T. Moataz, "Boolean searchable symmetric encryption with worst-case sub-linear complexity," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pages 94-124, 2017. |
17 | J. Li, Q. Wang, C.Wang, and et al., "Fuzzy keyword search over encrypted data in cloud computing," in Proc. of INFOCOM, 2010 Proceedings IEEE, pages 1-5, 2010. |
18 | M. Swan, "Blockchain: Blueprint for a new economy [M]," O'Reilly Media, Inc., 2015. |
19 | H. G. Li, F. G. Zhang, and C. I. Fan, "Deniable searchable symmetric encryption," Information Sciences, 402:233-243, 2017. DOI |
20 | S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008. |
21 | M. Andrychowicz, S. Dziembowski, D. Malinowski, and et al., "Fair two-party computations via bitcoin deposits," in Proc. of International Conference on Financial Cryptography and Data Security, Springer, pages 105-121, 2014. |
22 | D. Chaum, "Blind signatures for untraceable payments," Advances in cryptology, pages 199-203, Springer, 1983. |
23 | D. Chaum, "Blind signature system," Advances in cryptology, Springer, pages 153-153, 1984. |
24 | M. Andrychowicz, S. Dziembowski, D. Malinowski, and et al., "Secure multiparty computations on bitcoin," in Proc. of 2014 IEEE Symposium on Security and Privacy, IEEE, pages 443-458, 2014. |
25 | S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. of the 2012 ACM conference on Computer and communications security, ACM, pages 965-976, 2012. |
26 | A. Boldyreva, N. Chenette, "Efficient fuzzy search on encrypted data," Fast Software Encryption, Springer, pages 613-633, 2014. |
27 | W. K. Wong, D. W. Cheung, B. Kao, and et al., "Secure knn computation on encrypted databases," in Proc. of the 2009 ACM SIGMOD International Conference on Management of data, ACM, pages 139-152, 2009. |
28 | N. Cao, C. Wang, M. Li, and et al., "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., 25(1), 222-233, 2014. DOI |
29 | Z. J. Fu, F. X. Huang, K. Ren, and et al., "Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data," IEEE Trans. Information Forensics and Security, 12(8):1874-1884, 2017. DOI |
30 | P. V. Liesdonk, S. Sedghi, J. Doumen, and et al., "Computationally efficient searchable symmetric encryption," in Proc. of Workshop on Secure Data Management, Springer, pages 87-100, 2010. |
31 | K. Kurosawa and Y. Ohtaki, "How to update documents verifiably in searchable symmetric encryption," in Proc. of Cryptology and Network Security-12th International Conference, CANS 2013, pages 309-328, Paraty, Brazil, November 20-22, 2013. |
32 | D. Cash, J. Jaeger, S. Jarecki, and et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," NDSS, volume 14, pages 23-26, Citeseer, 2014. |
33 | M. Naveed, M. Prabhakaran, and C.A. Gunter, "Dynamic searchable encryption via blind storage," Security and Privacy (SP), 2014 IEEE Symposium on, IEEE, pages 639-654, 2014. |
34 | C. Guo, X. Chen, Y. M. Jie, and et al., "Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption," IEEETrans. Services Computing, 2017. |
![]() |