[1] Song D, Wagner D, Perrig A.Practical Techniques for Searches on Encrypted Data[C]//Proc of the 2000 IEEE S&P’00.California:IEEE,2000:44-45
[2] 古宜平,马昌社.支持联合查询的高效可搜索对称加密方案[J].华南师范大学学报(自然科学版), 2020, 52(3): 120-128
[3] 刘会梦,张光华,庞少博等.云计算下高效灵活的属性基加密方案[J].信息安全研究, 2017, 3(11): 1034-1039
[4] Bost R.Sophos:Forward secure searchable encryption[C]//Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security.New York:ACM, 2016:1143-1154
[5] Bost R,Minaud B,Ohrimenko O. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives[C]//Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security. New York:ACM,2017:1465-1482
[6] Ghareh Chamani J, Papadopoulos D, Papamanthou C, et al.New Constructions for Forward and Backward Private Symmetric Searchable Encryption[C]//Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security. New York:ACM,2018: 1038-1055
[7] 李涵,张晨,黄荷姣等.一种支持前向安全更新和验证的加密搜索算法[J].西安电子科技大学学报,2020,47(5):46-56
[8] Amjad G, Kamara S, Moataz T.Forward and backward private searchable encryption with SGX[C]//Proc of the 12th European Workshop on Systems Security.Dresden: EuroSec,2019:1-6
[9] Kamara S, Papamanthou C, Roeder T.Dynamic searchable symmetric encryption[C]//Proc of the 2012 ACM conf on Computer and communications security.New York:ACM,2012: 965-976
[10] Cash D, Jaeger J, Jarecki S, et al. Dynamic searchable encryption in very-large databases: data structures and implementation[C]//NDSS. 2014, 14: 23-26
[11] Zuo C, Sun S F, Liu J K, et al.Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security[C]//Proc of the European Symposium on Research in Computer Security. Springer, Cham, 2018: 228-246
[12] Priebe C, Vaswani K, Costa M.EnclaveDB: A secure database using SGX[C]//Proc of the 2018 IEEE S&P’18. San Francisco:IEEE, 2018: 264-278
[13] 王冠,梁世豪. 基于SGX的Hadoop KMS安全增强方案[J]. 信息安全研究, 2019, 5(6): 514-520
[14] Fuhry B, Bahmani R, Brasser F, et al. HardIDX: Practical and secure index with SGX[C]//Proc of the IFIP Annual Conference on Data and Applications Security and Privacy. Springer, Cham, 2017: 386-408
[15] Ren K, Guo Y, Li J, et al. Hybridx:New hybrid index for volume-hiding range queries in data outsourcing services[C]//Proc of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). Singapore,IEEE, 2020: 23-33
[16] 王进文, 江勇, 李琦,等. SGX 技术应用研究综述. 网络新媒体技术, 2017, 6(5): 3-9
[17] 王鹃,樊成阳,程越强等.SGX技术的分析和研究.软件学报,2018,29(9):2778−2798
[18] 董春涛,沈晴霓,罗武等.SGX应用支持技术研究进展.软件学报.2020:1-30
[19] Duan H, Wang C, Yuan X, et al.LightBox:Full-stack protected stateful middlebox at lightning speed[C]//Proc of the 2019 ACM SIGSAC Conference on Computer and Communications Security. London,2019: 2351-2367
[20] Yarom Y,Falkner K.FLUSH+RELOAD:A high resolution, low noise, L3 cache side-channel attack[C]//Proc of the 23rd {USENIX} Security Symposium.San Diego, CA ,2014:719-732
|