{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:06:46Z","timestamp":1750392406319,"version":"3.41.0"},"publisher-location":"Cham","reference-count":70,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957635","type":"print"},{"value":"9783031957642","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95764-2_15","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:45:12Z","timestamp":1750315512000},"page":"370-399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting the\u00a0Attacker\u2019s Knowledge in\u00a0Inference Attacks Against Searchable Symmetric Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9484-4460","authenticated-orcid":false,"given":"Marc","family":"Damie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3409-5303","authenticated-orcid":false,"given":"Jean-Benoist","family":"Leger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4049-5354","authenticated-orcid":false,"given":"Florian","family":"Hahn","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2929-5001","authenticated-orcid":false,"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Blackstone, L., Kamara, S., Moataz, T.: Revisiting leakage abuse attacks. In: Network and Distributed System Security Symposium (NDSS) (2020)","DOI":"10.14722\/ndss.2020.23103"},{"issue":"6973","key":"15_CR2","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1136\/bmj.310.6973.170","volume":"310","author":"JM Bland","year":"1995","unstructured":"Bland, J.M., Altman, D.G.: Multiple significance tests: the Bonferroni method. BMJ 310(6973), 170 (1995). https:\/\/doi.org\/10.1136\/bmj.310.6973.170","journal-title":"BMJ"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Boldyreva, A., Gui, Z., Warinschi, B.: Understanding leakage in searchable encryption: a quantitative approach. Proc. Priv. Enhancing Technol. 2024(4), 503\u2013524 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0127","DOI":"10.56553\/popets-2024-0127"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Bost, R.: Sophos: forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016. pp. 1143\u20131154. Association for Computing Machinery (Oct 2016). https:\/\/doi.org\/10.1145\/2976749.2978303","DOI":"10.1145\/2976749.2978303"},{"key":"15_CR5","unstructured":"Bost, R., Fouque, P.A.: Thwarting Leakage Abuse Attacks against Searchable Encryption \u2013 A Formal Approach and Applications to Database Padding (2017)"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465\u20131482. ACM (Oct 2017). https:\/\/doi.org\/10.1145\/3133956.3133980","DOI":"10.1145\/3133956.3133980"},{"issue":"356","key":"15_CR7","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1080\/01621459.1976.10480949","volume":"71","author":"G Box","year":"1976","unstructured":"Box, G.: Science and statistics. J. Am. Stat. Assoc. 71(356), 791\u2013799 (1976). https:\/\/doi.org\/10.1080\/01621459.1976.10480949","journal-title":"J. Am. Stat. Assoc."},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,CCS 2015, pp. 668\u2013679. , Association for Computing Machinery (2015). https:\/\/doi.org\/10.1145\/2810103.2813700","DOI":"10.1145\/2810103.2813700"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.C., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedings 2014 Network and Distributed System Security Symposium. Internet Society (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23264","DOI":"10.14722\/ndss.2014.23264"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577\u2013594. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_33"},{"key":"15_CR11","unstructured":"Chen, M., Goel, K., Sohoni, N.S., Poms, F., Fatahalian, K., Re, C.: Mandoline: model evaluation under distribution shift. In: Proceedings of the 38th International Conference on Machine Learning. pp. 1617\u20131629. PMLR (Jul 2021), iSSN: 2640-3498"},{"issue":"5","key":"15_CR12","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1086\/230638","volume":"100","author":"CC Clogg","year":"1995","unstructured":"Clogg, C.C., Petkova, E., Haritou, A.: Statistical methods for comparing regression coefficients between models. Am. J. Sociol. 100(5), 1261\u20131293 (1995). https:\/\/doi.org\/10.1086\/230638","journal-title":"Am. J. Sociol."},{"key":"15_CR13","unstructured":"Cram\u00e9r, H.: Mathematical Methods of Statistics. Princeton University Press (Apr 1999)"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 79\u201388. Association for Computing Machinery (2006). https:\/\/doi.org\/10.1145\/1180405.1180417","DOI":"10.1145\/1180405.1180417"},{"key":"15_CR15","unstructured":"Damie, M., Hahn, F., Peter, A.: A highly accurate query-recovery attack against searchable encryption using non-indexed documents. In: 30th USENIX Security Symposium (USENIX Security 21). pp. 143\u2013160 (2021)"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Dijkslag, M., Damie, M., Hahn, F., Peter, A.: Passive query-recovery attack against secure conjunctive keyword search schemes. In: Ateniese, G., Venturi, D. (eds.) Applied Cryptography and Network Security. pp. 126\u2013146. LNCS, Springer International Publishing (2022). https:\/\/doi.org\/10.1007\/978-3-031-09234-3_7","DOI":"10.1007\/978-3-031-09234-3_7"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Dittert, D., Schneider, T., Treiber, A.: Too close for comfort? measuring success of sampled-data leakage attacks against encrypted search. In: Cloud Computing Security Workshop (CCSW 2023) (2023)","DOI":"10.1145\/3605763.3625243"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Everitt, B.S., Skrondal, A.: The Cambridge dictionary of statistics. Cambridge University Press (2010)","DOI":"10.1017\/CBO9780511779633"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Falzon, F., Markatou, E.A., Akshima, Cash, D., Rivkin, A., Stern, J., Tamassia, R.: Full database reconstruction in two dimensions. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, pp. 443\u2013460. Association for Computing Machinery, New York(Nov 2020). https:\/\/doi.org\/10.1145\/3372297.3417275","DOI":"10.1145\/3372297.3417275"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Ghareh\u00a0Chamani, J., Papadopoulos, D., Papamanthou, C., Jalili, R.: New constructions for forward and backward private symmetric searchable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1038\u20131055. ACM (Oct 2018). https:\/\/doi.org\/10.1145\/3243734.3243833","DOI":"10.1145\/3243734.3243833"},{"key":"15_CR21","unstructured":"Griliches, Z., Heckman, J.J., Intriligator, M.D., Engle, R.F., Leamer, E.E., McFadden, D.: Handbook of econometrics. Elsevier (1983)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Grubbs, P., Lacharit\u00e9, M.S., Minaud, B., Paterson, K.G.: Pump up the volume: Practical database reconstruction from volume leakage on range queries. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 315\u2013331 (2018)","DOI":"10.1145\/3243734.3243864"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Gui, Z., Paterson, K.G., Patranabis, S.: Rethinking searchable symmetric encryption. In: 2023 IEEE Symposium on Security and Privacy (SP), p.\u00a044 (2023)","DOI":"10.1109\/SP46215.2023.10179460"},{"issue":"1","key":"15_CR24","first-page":"25","volume":"59","author":"J Hadar","year":"1969","unstructured":"Hadar, J., Russell, W.R.: Rules for ordering uncertain prospects. Am. Econ. Rev. 59(1), 25\u201334 (1969)","journal-title":"Am. Econ. Rev."},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Hao, L., Naiman, D.Q.: Quantile regression. Sage (2007)","DOI":"10.4135\/9781412985550"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Ho, B., Chen, H., Shi, Z., Liang, K.: Similar data is powerful: enhancing inference attacks on SSE with volume leakages. In: Garcia-Alfaro, J., Kozik, R., Chora\u015b, M., Katsikas, S. (eds.) Computer Security - ESORICS 2024, pp. 105\u2013126. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-70903-6_6","DOI":"10.1007\/978-3-031-70903-6_6"},{"key":"15_CR27","unstructured":"Holm, S.: A simple sequentially rejective multiple test procedure. Scandinavian J. statist., 65\u201370 (1979)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Hsu, J.: Multiple comparisons: theory and methods. CRC Press (1996)","DOI":"10.1201\/b15074"},{"key":"15_CR29","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: Network and Distributed System Security Symposium (NDSS) (2012)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Kamara, S., Kati, A., Moataz, T., Schneider, T., Treiber, A., Yonli, M.: SoK: Cryptanalysis of encrypted search with LEAKER - a framework for leakage attack evaluation on real-world data. In: IEEE European Symposium on Security and Privacy (EuroS &P 2022). IEEE (Jun 2022)","DOI":"10.1109\/EuroSP53844.2022.00014"},{"key":"15_CR31","unstructured":"Kamara, S., Moataz, T.: Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search (2023)"},{"key":"15_CR32","doi-asserted-by":"publisher","unstructured":"Kamara, S., Moataz, T., Ohrimenko, O.: Structured encryption and leakage suppression. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 339\u2013370. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_12","DOI":"10.1007\/978-3-319-96884-1_12"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Kanji, G.K.: 100 statistical tests. Sage Publications, 3rd ed edn. (2006)","DOI":"10.4135\/9781849208499"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Kellaris, G., Kollios, G., Nissim, K., O\u2019neill, A.: Generic attacks on secure outsourced databases. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 1329\u20131340 (2016)","DOI":"10.1145\/2976749.2978386"},{"key":"15_CR35","unstructured":"Klimt, B., Yang, Y.: Introducing the enron corpus. In: CEAS (2004)"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Koenker, R., Bassett, G.: Regression quantiles. Econometrica, 33\u201350 (1978)","DOI":"10.2307\/1913643"},{"issue":"4","key":"15_CR37","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1257\/jep.15.4.143","volume":"15","author":"R Koenker","year":"2001","unstructured":"Koenker, R., Hallock, K.F.: Quantile regression. J. Econ. Perspect. 15(4), 143\u2013156 (2001). https:\/\/doi.org\/10.1257\/jep.15.4.143","journal-title":"J. Econ. Perspect."},{"key":"15_CR38","doi-asserted-by":"publisher","unstructured":"Kornaropoulos, E.M., Moyer, N., Papamanthou, C., Psomas, A.: Leakage inversion: towards quantifying privacy in searchable encryption. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, pp. 1829\u20131842. Association for Computing Machinery (Nov 2022). https:\/\/doi.org\/10.1145\/3548606.3560593","DOI":"10.1145\/3548606.3560593"},{"key":"15_CR39","doi-asserted-by":"publisher","unstructured":"Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: Data recovery on encrypted databases with k-nearest neighbor query leakage. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1033\u20131050 (May 2019). https:\/\/doi.org\/10.1109\/SP.2019.00015","DOI":"10.1109\/SP.2019.00015"},{"key":"15_CR40","doi-asserted-by":"publisher","unstructured":"Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: The state of the uniform: attacks on encrypted databases beyond the uniform query distribution. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1223\u20131240. IEEE, San Francisco, CA, USA (May 2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00029","DOI":"10.1109\/SP40000.2020.00029"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Lacharit\u00e9, M.S., Minaud, B., Paterson, K.G.: Improved reconstruction attacks on encrypted data using range query leakage. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 297\u2013314. IEEE (2018)","DOI":"10.1109\/SP.2018.00002"},{"key":"15_CR42","doi-asserted-by":"publisher","unstructured":"Lambregts, S., Chen, H., Ning, J., Liang, K.: VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents. In: Atluri, V., Di\u00a0Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security - ESORICS 2022. pp. 653\u2013676. LNCS. Springer International Publishing (2022). https:\/\/doi.org\/10.1007\/978-3-031-17140-6_32","DOI":"10.1007\/978-3-031-17140-6_32"},{"key":"15_CR43","doi-asserted-by":"publisher","unstructured":"Langhout, T.J., Chen, H., Liang, K.: File-injection attacks on searchable encryption, based on binomial structures. In: Garcia-Alfaro, J., Kozik, R., Chora\u015b, M., Katsikas, S. (eds.) Computer Security - ESORICS 2024, pp. 424\u2013443. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-70896-1_21","DOI":"10.1007\/978-3-031-70896-1_21"},{"key":"15_CR44","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L., Wang, M., Tan, Y.A.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176\u2013188 (2014)","journal-title":"Inf. Sci."},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Markatou, E.A., Falzon, F., Espiritu, Z., Tamassia, R.: Attacks on Encrypted response-hiding range search schemes in multiple dimensions. Proc. Priv. Enhancing Technol. (2023)","DOI":"10.56553\/popets-2023-0106"},{"key":"15_CR46","doi-asserted-by":"publisher","unstructured":"Markatou, E.A., Falzon, F., Tamassia, R., Schor, W.: Reconstructing with less: leakage abuse attacks in two dimensions. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS 2021, pp. 2243\u20132261. Association for Computing Machinery, New York (Nov 2021). https:\/\/doi.org\/10.1145\/3460120.3484552","DOI":"10.1145\/3460120.3484552"},{"key":"15_CR47","unstructured":"Miller, R.G.J.: Simultaneous Statistical Inference. Springer Science & Business Media (Dec 2012)"},{"key":"15_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2018.07.007","volume":"267","author":"T Miller","year":"2019","unstructured":"Miller, T.: Explanation in artificial intelligence: insights from the social sciences. Artif. Intell. 267, 1\u201338 (2019). https:\/\/doi.org\/10.1016\/j.artint.2018.07.007","journal-title":"Artif. Intell."},{"key":"15_CR49","doi-asserted-by":"crossref","unstructured":"Ning, J., et al.: LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2307\u20132320 (2021)","DOI":"10.1145\/3460120.3484540"},{"issue":"3","key":"15_CR50","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2018.2866321","volume":"14","author":"J Ning","year":"2018","unstructured":"Ning, J., Xu, J., Liang, K., Zhang, F., Chang, E.C.: Passive attacks against searchable encryption. IEEE Trans. Inf. Forensics Secur. 14(3), 789\u2013802 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR51","unstructured":"Oya, S., Kerschbaum, F.: Hiding the access pattern is not enough: exploiting search pattern leakage in searchable encryption. In: 30th USENIX Security Symposium (USENIX Security 2021) (2021)"},{"key":"15_CR52","unstructured":"Oya, S., Kerschbaum, F.: IHOP: improved statistical query recovery against searchable symmetric encryption through quadratic optimization. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 2407\u20132424 (2022)"},{"key":"15_CR53","doi-asserted-by":"crossref","unstructured":"Poddar, R., Wang, S., Lu, J., Popa, R.A.: Practical Volume-Based Attacks on Encrypted Databases. arXiv:2008.06627 [cs] (Aug 2020)","DOI":"10.1109\/EuroSP48549.2020.00030"},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program (1980)","DOI":"10.1108\/eb046814"},{"key":"15_CR55","doi-asserted-by":"crossref","unstructured":"Pouliot, D., Wright, C.V.: The shadow nemesis: inference attacks on efficiently deployable, efficiently searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1341\u20131352 (2016)","DOI":"10.1145\/2976749.2978401"},{"key":"15_CR56","first-page":"81","volume":"37","author":"CR Rao","year":"1945","unstructured":"Rao, C.R.: Information and accuracy attainable in the estimation of statistical parameters. Bull. Calcutta Math. Soc. 37, 81\u201391 (1945)","journal-title":"Bull. Calcutta Math. Soc."},{"key":"15_CR57","unstructured":"Schler, J., Koppel, M., Argamon, S., Pennebaker, J.W.: Effects of age and gender on blogging. In: AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs, vol.\u00a06, pp. 199\u2013205 (2006)"},{"key":"15_CR58","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, S &P 2000. pp. 44\u201355. IEEE (2000)"},{"key":"15_CR59","doi-asserted-by":"publisher","unstructured":"Sun, S.F., et al.: Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In: Proceedings 2021 Network and Distributed System Security Symposium. Internet Society (2021). https:\/\/doi.org\/10.14722\/ndss.2021.24162","DOI":"10.14722\/ndss.2021.24162"},{"key":"15_CR60","doi-asserted-by":"publisher","unstructured":"Sun, S.F., et al.: Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,CCS 2018, pp. 763\u2013780. Association for Computing Machinery (Oct 2018). https:\/\/doi.org\/10.1145\/3243734.3243782","DOI":"10.1145\/3243734.3243782"},{"issue":"2","key":"15_CR61","first-page":"58","volume":"106","author":"A Tsymbal","year":"2004","unstructured":"Tsymbal, A.: The problem of concept drift: definitions and related work. Comput. Sci. Departm. Trinity College Dublin 106(2), 58 (2004)","journal-title":"Comput. Sci. Departm. Trinity College Dublin"},{"issue":"4","key":"15_CR62","doi-asserted-by":"publisher","first-page":"4236","DOI":"10.1109\/TKDE.2021.3126607","volume":"35","author":"V Vo","year":"2023","unstructured":"Vo, V., Yuan, X., Sun, S.F., Liu, J.K., Nepal, S., Wang, C.: ShieldDB: an encrypted document database with padding countermeasures. IEEE Trans. Knowl. Data Eng. 35(4), 4236\u20134252 (2023). https:\/\/doi.org\/10.1109\/TKDE.2021.3126607","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"15_CR63","unstructured":"Weisstein, E.W.: Bonferroni correction (2004). https:\/\/mathworldwolfram.com\/"},{"key":"15_CR64","doi-asserted-by":"crossref","unstructured":"Xu, L., Duan, H., Zhou, A., Yuan, X., Wang, C.: Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Trans. Inform. Forensics Sec. (2021)","DOI":"10.1109\/TIFS.2021.3128823"},{"key":"15_CR65","doi-asserted-by":"crossref","unstructured":"Xu, L., Yuan, X., Wang, C., Wang, Q., Xu, C.: Hardening database padding for searchable encryption. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 2503\u20132511. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737588"},{"key":"15_CR66","doi-asserted-by":"crossref","unstructured":"Xu, L., Zheng, L., Xu, C., Yuan, X., Wang, C.: Leakage-abuse attacks against forward and backward private searchable symmetric encryption. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023. Association for Computing Machinery (2023)","DOI":"10.1145\/3576915.3623085"},{"key":"15_CR67","doi-asserted-by":"publisher","unstructured":"Zhang, M., Shi, Z., Chen, H., Liang, K.: Inject less, recover more: unlocking the potential of document recovery in injection attacks against SSE. In: 2024 IEEE 37th Computer Security Foundations Symposium (CSF), pp. 311\u2013323. IEEE Computer Society (Jul 2024). https:\/\/doi.org\/10.1109\/CSF61375.2024.00029, https:\/\/www.computer.org\/csdl\/proceedings-article\/csf\/2024\/620300a441\/1W0eVXbBGsE","DOI":"10.1109\/CSF61375.2024.00029"},{"key":"15_CR68","unstructured":"Zhang, X., Wang, W., Xu, P., Yang, L.T., Liang, K.: High recovery with fewer injections: practical binary volumetric injection attacks against dynamic searchable encryption. In: 32nd USENIX Security Symposium (USENIX Security 23) (Feb 2023)"},{"key":"15_CR69","unstructured":"Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 707\u2013720 (2016)"},{"key":"15_CR70","doi-asserted-by":"publisher","unstructured":"\u017dliobait\u0117, I., Pechenizkiy, M., Gama, J.: An overview of concept drift applications. In: Japkowicz, N., Stefanowski, J. (eds.) Big Data Analysis: New Algorithms for a New Society, vol.\u00a016, pp. 91\u2013114. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-26989-4_4","DOI":"10.1007\/978-3-319-26989-4_4"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95764-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:45:27Z","timestamp":1750315527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95764-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957635","9783031957642"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95764-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}