共 35 条
[1]
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1465-1482
[2]
Σοφοζ - Forward Secure Searchable Encryption
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1143-1154
[3]
Burkhalter L, 2020, PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P835
[4]
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[5]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[6]
Cash D, 2014, LECT NOTES COMPUT SC, V8441, P351, DOI 10.1007/978-3-642-55220-5_20
[7]
Chamani JG, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P2425
[8]
New Constructions for Forward and Backward Private Symmetric Searchable Encryption
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1038-1055
[9]
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
[J].
COMPUTER SECURITY - ESORICS 2021, PT II,
2021, 12973
:3-23