Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133970
|View full text |Cite
|
Sign up to set email alerts
|

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
77
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 119 publications
(78 citation statements)
references
References 23 publications
1
77
0
Order By: Relevance
“…Dynamic SSE schemes were designed to handle large DBs with possible updates (see details in subsection IV-D). Concurrently to our work [13] proposed a combination of the forward and inverted index approach. Keyword search in the public-key setting (PEKS) was introduced by [2] and later improved in several directions [4].…”
Section: A Related Workmentioning
confidence: 99%
“…Dynamic SSE schemes were designed to handle large DBs with possible updates (see details in subsection IV-D). Concurrently to our work [13] proposed a combination of the forward and inverted index approach. Keyword search in the public-key setting (PEKS) was introduced by [2] and later improved in several directions [4].…”
Section: A Related Workmentioning
confidence: 99%
“…for users to securely and dynamically build the encrypted database [34][35][36][37]. Since 2016 several schemes have been proposed to achieve this goal using different cryptographic primitives, including Sophos [20] (uses trapdoor permutation (TDP)), Diana [24] (uses Constrained Pseudorandom Function (CPRF)), and Dual [25] (uses keyed hash function). Among them, Diana [24] and Dual [25] only use symmetric primitives and are more efficient.…”
Section: The Need For Forward Privacymentioning
confidence: 99%
“…Since 2016 several schemes have been proposed to achieve this goal using different cryptographic primitives, including Sophos [20] (uses trapdoor permutation (TDP)), Diana [24] (uses Constrained Pseudorandom Function (CPRF)), and Dual [25] (uses keyed hash function). Among them, Diana [24] and Dual [25] only use symmetric primitives and are more efficient. Backward privacy (BP) is a related security notion that prevents search operations from leaking the matching elements after they have been deleted.…”
Section: The Need For Forward Privacymentioning
confidence: 99%
See 2 more Smart Citations