1 |
S.F. Sun, C. Zuo, J.K. Liu, A. Sakzad, R. Steinfeld, T.H. Yuen, D. Gu, "Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation," IEEE Trans. Depend. Secure Comput, vol. 19, no. 1, pp. 452-467, 2022.
DOI
|
2 |
G. Xu, H.W. Li, Y.S. Dai, K. Yang, X.D. Lin, "Enabling efficient and geometric range query with access control over encrypted spatial data," IEEE Trans.Inf. Forensics Security, vol.14, no.4, pp.870-885, Apr.2019.
DOI
|
3 |
Y. Zhang, J. Katz, and C. Papamanthou, "All your queries are belong to us: The power of file-injection attacks on searchable encryption," in Proc. of IEEE Symp. Secur. Privacy, pp. 707-720, 2016.
|
4 |
X. Song, C. Dong, D. Yuan, Q.L. Xu, M.H. Zhao, "Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency," IEEE Trans. Depend. Secure Comput, vol.17, no.5, pp.912-927, Sept.-Oct. 1 2020.
DOI
|
5 |
L. Du, K. Li, Q. Liu, Z. Wu, S. Zhang, "Dynamic multi-client searchable symmetric encryption with support for boolean queries," Inf. Sci, vol.506, pp.234-257, Jan. 2020.
DOI
|
6 |
M. Raykova, B. Vo, S. M. Bellovin, and T. Malkin, "Secure anonymous database search," in Proc. of the 2009 ACM workshop on Cloud computing security, pp. 115-126, 2009.
|
7 |
B.A. Fisch, B. Vo, F. Krell, A. Kumarasubramanian, V. Kolesnikov, T. Malkin, S.M. Bellovin, "Malicious-client security in blind seer: a scalable private DBMS," in Proc. of IEEE Symp. Secur. Privacy, pp. 395-410, 2015.
|
8 |
S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M. Rosu, M. Steiner, "Rich queries on encrypted data: beyond exact matches," in Proc. of ESORICS, Vienna, Austria, 123-145, 2015.
|
9 |
D. Cash, P. Grubbs, J. Perry, and T. Ristenpart, "Leakage-abuse attacks against searchable encryption," in Proc. of 22nd ACM SIGSAC Conf. Comput. Commun. Secur., pp. 668-679, 2015.
|
10 |
Y. Wei, S. Lv, X. Guo, Z. Liu, Y. Huang, and B. Li, "FSSE: Forward secure searchable encryption with keyed-block chains," Inf. Sci., vol. 500, pp. 113-126, Oct. 2019.
DOI
|
11 |
B. Fuhry, R. Bahmani, F. Brasser, F. Hahn, F. Kerschbaum, AR. Sadeghi, "HardIDX: Practical and Secure Index with SGX," in Proc. of IFIP Annual Conference on Data and Applications Security and Privacy XXXI, pp.386-408, 2017.
|
12 |
J. G. Chamani, D. Papadopoulos, C. Papamanthou, and R. Jalili, "New constructions for forward and backward private symmetric searchable encryption," in Proc. of ACM Conf Computer Commun Secur., pp. 1038-1055, 2018.
|
13 |
H. Li, Y. Yang, Y. Dai, Y. Shui, X. Yong, "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data," IEEE Trans.Cloud Comput, vol.8, no.2, pp. 484-494. April-June 2020.
DOI
|
14 |
X. Liu, G. Yang, Y. Mu, H. Deng, "Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage," IEEE Trans. Depend.Secure Comput, vol.17, no.6, pp.1322-1332, Nov.-Dec. 1 2020.
DOI
|
15 |
K. S. Kim, M. Kim, D. Lee, J. H. Park, and W. Kim, "Forward secure dynamic searchable symmetric encryption with efficient updates," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 1449-1463, 2017.
|
16 |
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symp. Secur. Privacy, pp. 44-55, 2000.
|
17 |
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 965-976, 2012.
|
18 |
S. Tahir, S. Ruj, Y. Rahulamathavan, M. Rajarajan and C. Glackin, "A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data," IEEE Trans. Emerging Topics in Computing, vol. 7, no. 4, pp. 530-544, 1 Oct.-Dec. 2019.
DOI
|
19 |
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of Int. Conf. Theory Appl. Cryptographic Techn., pp. 506-522, 2004.
|
20 |
M.Naveed, M. Prabhakaran, and C.A. Gunter, "Dynamic searchable encryption via blind storage," in Proc. of IEEE Symp. Secur. Privacy, pp. 639-654, 2014.
|
21 |
J. Li, Y. Huang, Y. Wei, Z. L. Liu, C. Y. Dong, W. J. Lou, "Searchable Symmetric Encryption with Forward Search Privacy," IEEE Trans. Dependa. Secure Comput, vol. 18, no. 1, pp. 460-474, Jan/Feb 2021.
DOI
|
22 |
H. Li, Y. Yang, Y. Dai, S. Yu and Y. Xiang, "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data," IEEE Trans.Cloud Comput, vol. 8, no. 2, pp. 484-494, 1 April-June 2020.
DOI
|
23 |
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," Journal of Computer Security, vol. 19, no. 5, pp. 895-934, 2011.
DOI
|
24 |
S. Kamara, T. Moataz, "Boolean searchable symmetric encryption with worst-case sub-linear complexity," in Proc. of Advances in Cryptology - EUROCRYPT 2017, pp.94-124, 2017.
|
25 |
L. Ballard, S. Kamara, F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. of 7th. Int. Conf. Info. Commu. Secur, pp. 414-426, 2005.
|
26 |
S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Outsourced symmetric private information retrieval," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 875-888, 2013.
|
27 |
M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in Proc. of Advances in Cryptology - ASIACRYPT 2010, pp. 577-594, 2010.
|
28 |
P. Golle, J. Staddon, and B. R. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of International Conference on Applied Cryptography and Network Security, pp. 31-45, 2004.
|
29 |
S. Lai, S. Patranabis, A. Sakzad, J. Liu, D. Mukhopadhyay, R. Steinfeld, S. Sun, D. Liu, and C. Zuo, "Result pattern hidingsearchable encryption for conjunctive queries," in Proc. of ACM Conf. Comput. Commun. Secur., pp. 745-762, 2018.
|
30 |
D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for boolean queries," Advances in Cryptology-CRYPTO, pp. 353-373, 2013.
|