Proceedings 2021 Network and Distributed System Security Symposium 2021
DOI: 10.14722/ndss.2021.24162
|View full text |Cite
|
Sign up to set email alerts
|

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy

Abstract: In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that previous search queries cannot be associated with future updates, while backward privacy guarantees that subsequent search queries cannot be associated with deleted documents in the past. In this work, we propose a generic forward and backward-private DSSE scheme, which is, to the best of our knowledge, the first practical and non-interactive Type-II backward-private DSSE scheme not relying on trusted execution environments. To thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(11 citation statements)
references
References 44 publications
(135 reference statements)
0
11
0
Order By: Relevance
“…Li et al 57 proposed the concept of forward search privacy and designed a SSE scheme. Sun et al 58 designed a FPSE scheme using the Symmetric Revokable Encryption technique. Zhang et al 59 proposed a FPSE scheme based on lattice assumptions to realize postquantum secure.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al 57 proposed the concept of forward search privacy and designed a SSE scheme. Sun et al 58 designed a FPSE scheme using the Symmetric Revokable Encryption technique. Zhang et al 59 proposed a FPSE scheme based on lattice assumptions to realize postquantum secure.…”
Section: Related Workmentioning
confidence: 99%
“…Most of cryptographic research related to AMQ structures (e.g., [15,32,46]) focus on the Bloom filter [8] since unlike recent experimentally-efficient AMQ structures, it has been well analyzed in a theoretical sense. The previous works have completely different goals from ours: Derler et al [15] introduced Bloom filter encryption to efficiently realize puncturable encryption, which is a special type of public-key encryption; Naor and Yogev [32] considered the Bloom filter in adversarial environments to make the Bloom filter robust; and Sun et al [46] employed the Bloom filter to maintain encrypted database for searchable encryption. To the best of our knowledge, there is no research on cryptographic protocols based on AMQ structures in the context of secure remote control.…”
Section: Related Workmentioning
confidence: 99%
“…e bloom filter (BF) is a probabilistic data structure. It is very useful for performing collection membership tests quickly and in a space-saving manner, but it has the drawback that false positives do occur [34][35][36]. False positives are rare enough that many applications outweigh this disadvantage.…”
Section: Bloom Filtermentioning
confidence: 99%