2021
DOI: 10.1007/978-3-030-88428-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Secondly, we propose improvements to address existing security flaws, modeling the improved protocol through CPN Tools, and adding the same Dolev-Yao attacker model to detect the security of the new scheme. Finally, comparing the performance and security of the original protocol and the improved protocol, it was found that the improved scheme can enhance the security attributes of the protocol, effectively resist man-in-the-middle attacks, and ensure the forward security and backward security of the key [40,41] while being able to resist malicious instruction injection attacks. The improvement scheme proposed in this article is not only applicable to the EIBsec protocol but also has great reference value for other protocols in building automation systems such as BACnet, LonWroks, and OPC-UA [42].…”
Section: Discussionmentioning
confidence: 99%
“…Secondly, we propose improvements to address existing security flaws, modeling the improved protocol through CPN Tools, and adding the same Dolev-Yao attacker model to detect the security of the new scheme. Finally, comparing the performance and security of the original protocol and the improved protocol, it was found that the improved scheme can enhance the security attributes of the protocol, effectively resist man-in-the-middle attacks, and ensure the forward security and backward security of the key [40,41] while being able to resist malicious instruction injection attacks. The improvement scheme proposed in this article is not only applicable to the EIBsec protocol but also has great reference value for other protocols in building automation systems such as BACnet, LonWroks, and OPC-UA [42].…”
Section: Discussionmentioning
confidence: 99%
“…A robust DSSE scheme must guarantee the desired correctness and claimed security when the client issues irrational update queries. Unfortunately, up to now, besides the scheme ROSE proposed by Xu et al,only MONETA [4] and Bestie [46] achieve robustness. However, those robust DSSE schemes fail to achieve Type-I − backward privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Bost et al introduced another security notion, backward security [12], which limits the information leaked from the deleted ciphertexts during search queries. Since then, various DSSE schemes have been proposed to achieve both forward and backward security without loss of efficiency, e.g., [17], [18], [21], [25], [65], [66], [71], [73].…”
Section: A Motivationmentioning
confidence: 99%
“…Bost et al [12] formalized three types of backward security with leakage functions. Since then, many research works have proposed forward and backward secure constructions to achieve small search leakage [18], [52], [73], robustness under fault operations [71], constant client storage [25], [38], and practical search performance [17], [21], [65], [66].…”
Section: Dsse Revisited and Related Workmentioning
confidence: 99%