Skip to content

最新进展

1. TIFS

1.1 TIFS'21

文献1: A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud

关键词: Ranked Search, Semantic Search, Verifiable Search


文献2:Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost

关键词: Dynamic


文献3:SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption


1.2 TIFS'20

文献4:Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy


1.3 TIFS'19

文献5:Passive Attacks Against Searchable Encryption


1.4 TIFS'18

文献6:Semantic-Aware Searching Over Encrypted Data for Cloud Computing

文献7:Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage


2. TDSC

2.1 TDSC'21

文献8:Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness

文献9:Searchable Symmetric Encryption with Forward Search Privacy

文献10:Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

文献11:Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

文献12:Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud

文献13:Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data

文献14:Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings

文献15:Multi-Client Cloud-Based Symmetric Searchable Encryption

文献16:On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting

文献17:FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things



  1. W. Yang and Y. Zhu, “A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 100–115, 2021, doi: 10.1109/TIFS.2020.3001728. 

  2. K. He, J. Chen, Q. Zhou, R. Du, and Y. Xiang, “Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1538–1549, 2021, doi: 10.1109/TIFS.2020.3033412. 

  3. Q. Song, Z. Liu, J. Cao, K. Sun, Q. Li, and C. Wang, “SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1795–1809, 2021, doi: 10.1109/TIFS.2020.3042058. 

  4. L. Xu, W. Li, F. Zhang, R. Cheng, and S. Tang, “Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2096–2109, 2020, doi: 10.1109/TIFS.2019.2957691. 

  5. J. Ning, J. Xu, K. Liang, F. Zhang, and E.-C. Chang, “Passive Attacks Against Searchable Encryption,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 789–802, Mar. 2019, doi: 10.1109/TIFS.2018.2866321. 

  6. Z. Fu, L. Xia, X. Sun, A. X. Liu, and G. Xie, “Semantic-Aware Searching Over Encrypted Data for Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2359–2371, Sep. 2018, doi: 10.1109/TIFS.2018.2819121. 

  7. M. Du, Q. Wang, M. He, and J. Weng, “Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2320–2332, Sep. 2018, doi: 10.1109/TIFS.2018.2818651. 

  8. C. Cai, J. Weng, X. Yuan, and C. Wang, “Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 131–144, Jan. 2021, doi: 10.1109/TDSC.2018.2877332. 

  9. J. Li et al., “Searchable Symmetric Encryption with Forward Search Privacy,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 460–474, Jan. 2021, doi: 10.1109/TDSC.2019.2894411. 

  10. X. Ge et al., “Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 490–504, Jan. 2021, doi: 10.1109/TDSC.2019.2896258. 

  11. Y. Miao et al., “Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1080–1094, May 2021, doi: 10.1109/TDSC.2019.2897675. 

  12. H. Wang, J. Ning, X. Huang, G. Wei, G. S. Poh, and X. Liu, “Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1307–1319, May 2021, doi: 10.1109/TDSC.2019.2916569. 

  13. Y. Miao, R. H. Deng, X. Liu, K.-K. R. Choo, H. Wu, and H. Li, “Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 4, pp. 1667–1680, Jul. 2021, doi: 10.1109/TDSC.2019.2935044. 

  14. Y. Miao, R. H. Deng, K.-K. R. Choo, X. Liu, J. Ning, and H. Li, “Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 4, pp. 1804–1820, Jul. 2021, doi: 10.1109/TDSC.2019.2940573. 

  15. S. K. Kermanshahi et al., “Multi-Client Cloud-Based Symmetric Searchable Encryption,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2419–2437, Sep. 2021, doi: 10.1109/TDSC.2019.2950934. 

  16. J. Sun, H. Xiong, X. Nie, Y. Zhang, and P. Wu, “On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2518–2519, Sep. 2021, doi: 10.1109/TDSC.2019.2953744. 

  17. X. Zhang, C. Xu, H. Wang, Y. Zhang, and S. Wang, “FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1019–1032, May 2021, doi: 10.1109/TDSC.2019.2914117.