Journal of Information Security Research ›› 2015, Vol. 1 ›› Issue (3): 217-223.
Previous Articles Next Articles
Received:
2015-12-13
Online:
2015-12-15
Published:
2016-01-18
汪小芬
通讯作者:
汪小芬
作者简介:
汪小芬
博士,讲师,主要研究方向为密码学与信息安全.
wangxuedou@sina.com
张小松
博士,教授,主要研究方向为网络与数据安全.
johnsonzxs@uestc.edu.cn.
汪小芬(通讯作者),女,1982年生,博士,讲师,,主要研究领域为信息安全,Email: wangxuedou@sina.com.张小松,男,1968年生,博士,教授,,主要研究领域为网络与数据安全,Email: johnsonzxs@uestc.edu.cn.
[1]Boneh D, Crescenzo G D, Ostrovsky R, et al. Public key encryption with keyword search[G] LNCS 3027: Proc of Eurocrypt 2004. Berlin: Springer, 2004: 506522 [2]Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extension[J]. Journal of Cryptology, 2008, 21(3): 350391 [3]Rhee H S, Park J H, Susilo W, et al. Trapdoor security in a searchable publickey encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763771 [4]Fang L, Susilo W, Ge C, et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Science, 2013, 238(20): 221241 [5]Hwang Y H, Lee P J. Public key encryption with conjunctive keyword search and its extension to a multiuser system[G] LNCS 4757: Proc of Pairing 2007. Berlin: Springer, 2007: 222 [6]Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data[G] LNCS 4392: Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007: 535554 [7]Shi E, Bethencourt J, Chan H, et al, Multidimensional range query over encrypted data[C] Proc of the 2007 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2007: 350364 [8]Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers[G] LNCS 5094: Proc of DBSec 2008. Berlin: Springer, 2008: 127143 [9]Sun W, Yu W, Lou W, et al. Protecting your right: Attributebased keyword search with finegrained ownerenforced search authorization in the cloud[C] Proc of IEEE INFOCOM 2014. Los Alamitos, CA: IEEE Computer Society, 2014: 1851 [10]Wang P, Wang H, Pieprzyk J. Keyword fieldfree conjunctive keyword searches on encrypted data and extension for dynamic group[G] LNCS 5339: Proc of CANS 2008. Berlin: Springer, 2008: 178195 [11]Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption[C] Proc of ACM CCS 2012. New York: ACM, 2012: 965976 [12]Goh E. Secure Indexes[DBOL]. Cryptology ePrint Archive, Report 2003216. 2003 [20151104]. http:eprint.iacr.org2003216 [13]Curtmola R, Garay J, Kamara S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[C] Proc of ACM CCS 2006. New York: ACM, 2006: 7988 [14]Kurosawa K, Ohtaki Y. UCsecure searchable symmetric encryption[G] LNCS 7397: Proc of the 16th Int Financial Conf. Berlin: Springer, 2012: 285298 [15]Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C] Proc of IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2000: 4455 [16]Amanatidis G, Boldyreva A, ONeill A. Provablysecure schemes for basic query support in outsourced databases[G] LNCS 4602: Proc of DBSec 2007. Berlin: Springer, 2007: 1430 [17]Chase M, Kamara S. Structured encryption and controlled disclosure[G] LNCS 6477: Proc of ASIACRYPT 2010. Berlin: Springer, 2010: 577594 [18]Agrawal R, Kiernan J, Srikant R, et al. Orderpreserving encryption for numeric data[C] Proc of SIGMOD 2004. New York: ACM, 2004: 563574 [19]Li Rui, Liu A X, Wang A L, et al. Fast range query processing with strong privacy protection for cloud computing[C] Proc of the 40th VLDB. Berlin: Springer, 2014: 19531964 [20]Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data[G] LNCS 3089: Proc of ACNS. Berlin: Springer, 2004: 3145 [21]Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data[G] LNCS 3783: Proc of ICICS. Berlin: Springer, 2005: 414426 [22]Byun J W, Lee D H, Lim J. Efficient conjunctive keyword search on encrypted data storage system[G] LNCS 4043: Proc of EuroPKI 2006. Berlin: Springer, 2006: 184196 [23]Cash D, Jarecki S, Jutla C S, et al. Highlyscalable searchable symmetric encryption with support for Boolean queries[G] LNCS 8042: Proc of CRYPTO 2013. Berlin: Springer, 2013: 353373 [24]Jarecki S, Jutla C, Krawczyk H, et al. Outsourced symmetric private information retrieval[C] Proc of ACM CCS 2013. New York: ACM, 2013: 875888 [25]Shen E, Shi E, Waters B. Predicate privacy in encryption systems[G] LNCS 5444: Proc of TCC 2009. Berlin: Springer, 2009: 457473 [26]Cao Ning, Wang Cong, Li Ming, et al. Privacypreserving multikeyword ranked search over encrypted cloud data[C] Proc of IEEE INFOCOM 2011. Los Alamitos, CA: IEEE Computer Society, 2011: 829837 [27]Bosch C, Tang Q, Hartel P, et al. Selective document retrieval from encrypted database[G] LNCS 7483: Proc of ISC 2012. Berlin: Springer, 2012: 224241 [28]Kuzu M, Saiful Islam M, Kantarcioglu M. Efficient similarity search over encrypted data[C] Proc of ICDE 2012. Los Alamitos, CA: IEEE Computer Society, 2012: 11561167 [29]Sun W, Wang B, Cao Ning, et al. Verifiable privacy preserving multikeyword text search in the cloud supporting similaritybased ranking[J]. IEEE Trans on Parallel and Distributed Systems, 2013, 25(11): 30253035[30]Li H, Yang Y, Luan T H, et al. Enabling finegrained multikeyword search supporting classified subdictionaries over encrypted cloud data[J]. IEEE Trans on Dependable and Secure Computing, 2015, 99: 113 [31]Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption[C] Proc of Financial Cryptography (FC) 2013. Berlin: Springer, 2013: 258274 [32]Stefanov E, Papamanthou C, Shi E. Practical dynamic searchable encryption with small leakage[C] Proc of NDSS 2014. Los Alamitos, CA: IEEE Computer Society, 2014: 212226 [33]Cash D, Jaeger J, Jarecki S, et al. Dynamic searchable encryption in verylarge databases: Data structures and implementation[C] Proc of NDSS 2014. Berlin: Springer, 2014: 8892 [34]Hahn F, Kerschbaum F. Searchable encryption with secure and efficient updates[C] Proc of ACM CCS 2014. New York: ACM, 2014: 310320 [35]Bellovin S, Cheswick W. Privacyenhanced searches using encrypted bloom filters[DBOL]. IACR Cryptology ePrint Archive, 2004 [20151104]. http:eprint.iacr.org2004022 [36]Raykova M, Vo B, Bellovin S M, et al. Secure anonymous database search[C] Proc of CCSW 2009. New York: ACM, 2009: 115126 [37]Yang Y, Lu H, Weng J. Multiuser private keyword search for cloud computing[C] Proc of IEEE CloudCom 2011. Los Alamitos, CA: IEEE Computer Society, 2011: 264271 |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||