2017
DOI: 10.1007/978-3-319-61204-1_24
|View full text |Cite
|
Sign up to set email alerts
|

Forward-Secure Searchable Encryption on Labeled Bipartite Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(37 citation statements)
references
References 14 publications
0
37
0
Order By: Relevance
“…Recently, several forward-private DSSE schemes only relying on symmetric primitives have been proposed (e.g., [20], [21], [22], [23]), some of which offer parallelism (e.g., [20], [21], [23]), and improved I/O access with computation efficiency using a caching strategy (e.g., [20], [21], [22]). For example, Lai et al in [20] modeled the relationship between keywords and files in DSSE as bipartite graphs. The authors also proposed a novel data structure called cascaded triangles, which offers parallelism and efficient update (add/delete).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Recently, several forward-private DSSE schemes only relying on symmetric primitives have been proposed (e.g., [20], [21], [22], [23]), some of which offer parallelism (e.g., [20], [21], [23]), and improved I/O access with computation efficiency using a caching strategy (e.g., [20], [21], [22]). For example, Lai et al in [20] modeled the relationship between keywords and files in DSSE as bipartite graphs. The authors also proposed a novel data structure called cascaded triangles, which offers parallelism and efficient update (add/delete).…”
Section: Related Workmentioning
confidence: 99%
“…• Highly secure against File-Injection Attacks: IM-DSSE offers forward privacy (see [2] or §4 for definition) which is an imperative security feature to mitigate the impact of practical file-injection attacks [11], [16]. Only a limited number of DSSE schemes offer this property (i.e., [2], [11], [15], [18], [20], [21], [22], [23]), some of which incur high client storage with costly update (e.g., [2]) or high delay, due to oblivious access techniques (e.g., [18]) and public-key operations (e.g., [11]). Additionally, IM-DSSE offers size-obliviousness property, where it hides all size information involved with the encrypted index and update query including (i) update query size (i.e., number of unique keywords in the updated file); (ii) and the number of keyword-file pairs in the database.…”
Section: Improvements Over Preliminary Versionmentioning
confidence: 99%
See 2 more Smart Citations
“…Curtmola et al [19] proposed the most widely used security definition and the first scheme with non-trivial search time. It has since been improved in several ways, e.g., support for multiple users [49], [50], [33], more expressive queries including relational databases, conjunctive keywords, and graph queries [13], [34], [17], [41], [35], [22], [40], or efficient ondisk storage [14], [43], [7], [23], [20].…”
Section: B Related Workmentioning
confidence: 99%