{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:26:19Z","timestamp":1765106779608,"version":"3.46.0"},"publisher-location":"Singapore","reference-count":69,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819550951","type":"print"},{"value":"9789819550968","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5096-8_7","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:31Z","timestamp":1765106671000},"page":"203-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Structured Encryption and\u00a0Distribution-Aware Leakage Suppression"],"prefix":"10.1007","author":[{"given":"Marilyn","family":"George","sequence":"first","affiliation":[]},{"given":"Seny","family":"Kamara","sequence":"additional","affiliation":[]},{"given":"Tarik","family":"Moataz","sequence":"additional","affiliation":[]},{"given":"Zachary","family":"Espiritu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Adkins, D., Agarwal, A., Kamara, S., Moataz, T.: Encrypted blockchain databases. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 241\u2013254 (2020)","DOI":"10.1145\/3419614.3423266"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Espiritu, Z.: Sequentially consistent concurrent encrypted multimaps. In: 2025 IEEE 10th European Symposium on Security and Privacy (EuroS &P). IEEE (2025)","DOI":"10.1109\/EuroSP63326.2025.00042"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Agarwal, A., Kamara, S., Moataz, T.: Concurrent Encrypted Multimaps. In: Advances in Cryptology \u2013 ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9\u201313, 2024, Proceedings. Part IV, pp. 169\u2013201. Springer-Verlag, Berlin, Heidelberg (Dec 2024). https:\/\/doi.org\/10.1007\/978-981-96-0894-2_6","DOI":"10.1007\/978-981-96-0894-2_6"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Ajtai, M., Koml\u00f3s, J., Szemer\u00e9di, E.: An o(n log n) sorting network. In: ACM Symposium on Theory of Computing (STOC \u201983), pp.\u00a01\u20139 (1983)","DOI":"10.1145\/800061.808726"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Amjad, G., Kamara, S., Moataz, T.: Injection-secure structured and searchable symmetric encryption. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI. Lecture Notes in Computer Science, vol. 14443, pp. 232\u2013262. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-99-8736-8_8","DOI":"10.1007\/978-981-99-8736-8_8"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Amjad, G., Patel, S., Persiano, G., Yeo, K., Yung, M.: Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption. Proceedings on Privacy Enhancing Technologies (2023). https:\/\/petsymposium.org\/popets\/2023\/popets-2023-0025.php","DOI":"10.56553\/popets-2023-0025"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Asharov, G., Naor, M., Segev, G., Shahaf, I.: Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations. In: ACM Symposium on Theory of Computing (STOC \u201916), pp. 1101\u20131114. STOC \u201916, ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2897518.2897562","DOI":"10.1145\/2897518.2897562"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Batcher, K.: Sorting networks and their applications. In: Proceedings of the Joint Computer Conference, pp. 307\u2013314 (1968)","DOI":"10.1145\/1468075.1468121"},{"key":"7_CR9","unstructured":"Bienstock, A., Patel, S., Seo, J.Y., Yeo, K.: Near-optimal oblivious key-value stores for efficient psi, psu and volume-hiding multi-maps. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 301\u2013318 (2023)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Blackstone, L., Kamara, S., Moataz, T.: Revisiting leakage abuse attacks. In: Network and Distributed System Security Symposium (NDSS \u201920) (2020)","DOI":"10.14722\/ndss.2020.23103"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-84252-9_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2021","author":"A Bossuat","year":"2021","unstructured":"Bossuat, A., Bost, R., Fouque, P.-A., Minaud, B., Reichle, M.: SSE and SSD: page-efficient searchable symmetric encryption. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12827, pp. 157\u2013184. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_6"},{"key":"7_CR12","unstructured":"Bost, R.: Sophos - forward secure searchable encryption. In: ACM Conference on Computer and Communications Security (CCS \u201916) (20016)"},{"key":"7_CR13","unstructured":"Br\u00e9zot, T., H\u00e9bant, C.: Findex: A Concurrent and Database-Independent Searchable Encryption Scheme (2024). https:\/\/eprint.iacr.org\/2024\/1541, publication info: Preprint"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: ACM Conference on Communications and Computer Security (CCS \u201915), pp. 668\u2013679. ACM (2015)","DOI":"10.1145\/2810103.2813700"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_20"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-642-55220-5_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"D Cash","year":"2014","unstructured":"Cash, D., Tessaro, S.: The locality of searchable symmetric encryption. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 351\u2013368. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_20"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Network and Distributed System Security Symposium (NDSS \u201914) (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-030-78375-4_19","volume-title":"Applied Cryptography and Network Security","author":"D Cash","year":"2021","unstructured":"Cash, D., Ng, R., Rivkin, A.: Improved structured encryption for SQL databases via hybrid indexing. In: Sako, K., Tippenhauer, N.O. (eds.) ACNS 2021. LNCS, vol. 12727, pp. 480\u2013510. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78375-4_19"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577\u2013594. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_33"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R., Sears, R.: Benchmarking cloud serving systems with ycsb. In: Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 143\u2013154 (2010)","DOI":"10.1145\/1807128.1807152"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security (CCS \u201906), pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Demertzis, I., Papamanthou, C.: Fast searchable encryption with tunable locality. In: ACM International Conference on Management of Data (SIGMOD \u201917), pp. 1053\u20131067. SIGMOD \u201917, ACM, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3035918.3064057","DOI":"10.1145\/3035918.3064057"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Espiritu, Z., George, M., Kamara, S., Qin, L.: Synq: Public Policy Analytics Over Encrypted Data. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 146\u2013165. IEEE, San Francisco, CA, USA (May 2024). https:\/\/doi.org\/10.1109\/sp54263.2024.00085","DOI":"10.1109\/sp54263.2024.00085"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-24177-7_7","volume-title":"Computer Security \u2013 ESORICS 2015","author":"S Faber","year":"2015","unstructured":"Faber, S., Jarecki, S., Krawczyk, H., Nguyen, Q., Rosu, M., Steiner, M.: Rich queries on encrypted data: beyond exact matches. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 123\u2013145. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_7"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Falzon, F., Markatou, E.A., Espiritu, Z., Tamassia, R.: Range search over encrypted multi-attribute Data. Proc. VLDB Endowm. 16(4), 587\u2013600 (Dec 2022). https:\/\/doi.org\/10.14778\/3574245.3574247","DOI":"10.14778\/3574245.3574247"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-030-77883-5_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"M George","year":"2021","unstructured":"George, M., Kamara, S., Moataz, T.: Structured encryption and dynamic leakage suppression. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12698, pp. 370\u2013396. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77883-5_13"},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"7_CR28","unstructured":"Grubbs, P., et al.: Pancake: Frequency smoothing for encrypted data stores. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2451\u20132468 (2020)"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Grubbs, P., Lacharit\u00e9, M., Minaud, B., Paterson, K.G.: Pump up the volume: Practical database reconstruction from volume leakage on range queries. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pp. 315\u2013331. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243864","DOI":"10.1145\/3243734.3243864"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Grubbs, P., Lacharite, M.S., Minaud, B., Paterson, K.G.: Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 315\u2013331. CCS \u201918, Association for Computing Machinery, New York, NY, USA (Oct 2018). https:\/\/doi.org\/10.1145\/3243734.3243864","DOI":"10.1145\/3243734.3243864"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Grubbs, P., Lacharit\u00e9, M., Minaud, B., Paterson, K.G.: Learning to reconstruct: Statistical learning theory and encrypted database attacks. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pp. 1067\u20131083. IEEE (2019). https:\/\/doi.org\/10.1109\/SP.2019.00030","DOI":"10.1109\/SP.2019.00030"},{"key":"7_CR32","doi-asserted-by":"publisher","unstructured":"Gui, Z., Johnson, O., Warinschi, B.: Encrypted databases: new volume attacks against range queries. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 361\u2013378. CCS \u201919, Association for Computing Machinery, New York, NY, USA (Nov 2019). https:\/\/doi.org\/10.1145\/3319535.3363210","DOI":"10.1145\/3319535.3363210"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Gui, Z., Paterson, K.G., Patranabis, S., Warinschi, B.: Swissse: System-wide security for searchable symmetric encryption. Proceedings on Privacy Enhancing Technologies (2024)","DOI":"10.56553\/popets-2024-0032"},{"key":"7_CR34","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: Network and Distributed System Security Symposium (NDSS \u201912) (2012)"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Jutla, C., Patranabis, S.: Efficient searchable symmetric encryption for join queries. In: Advances in Cryptology\u2013ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5\u20139, 2022, Proceedings, Part III, pp. 304\u2013333. Springer (2023)","DOI":"10.1007\/978-3-031-22969-5_11"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Advances in Cryptology - EUROCRYPT \u201917 (2017)","DOI":"10.1007\/978-3-319-56617-7_4"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Kamara, S., Moataz, T.: Computationally volume-hiding structured encryption. In: Advances in Cryptology - Eurocrypt\u2019 19 (2019)","DOI":"10.1007\/978-3-030-17656-3_7"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Financial Cryptography and Data Security (FC \u201913) (2013)","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security (CCS \u201912). ACM Press (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"7_CR40","doi-asserted-by":"publisher","unstructured":"Kamara, S., Kati, A., Moataz, T., DeMaria, J., Park, A., Treiber, A.: MAPLE: Markov process leakage attacks on encrypted search. Proc. Priv. Enhanc. Technol. 2024(1), 430\u2013446 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0025","DOI":"10.56553\/popets-2024-0025"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Kamara, S., Kati, A., Moataz, T., Schneider, T., Treiber, A., Yonli, M.: SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data (2021). https:\/\/eprint.iacr.org\/2021\/1035, publication info: Published elsewhere. Minor revision. EuroS &P 2022","DOI":"10.1109\/EuroSP53844.2022.00014"},{"key":"7_CR42","doi-asserted-by":"publisher","unstructured":"Kamara, S., Kati, A., Moataz, T., Schneider, T., Treiber, A., Yonli, M.: Sok: cryptanalysis of encrypted search with leaker \u2013 a framework for leakage attack evaluation on real-world data. In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS &P), pp. 90\u2013108 (2022). https:\/\/doi.org\/10.1109\/EuroSP53844.2022.00014","DOI":"10.1109\/EuroSP53844.2022.00014"},{"key":"7_CR43","doi-asserted-by":"publisher","unstructured":"Kamara, S., Moataz, T.: SQL on Structurally-Encrypted Databases. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11272, pp. 149\u2013180. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03326-2_6","DOI":"10.1007\/978-3-030-03326-2_6"},{"key":"7_CR44","unstructured":"Kamara, S., Moataz, T.: Design and analysis of a stateless encrypted document database (2023). https:\/\/www.mongodb.com\/collateral\/stateless-document-database-encryption-scheme"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Kamara, S., Moataz, T., Ohrimenko, O.: Structured encryption and leakage suppression. In: Advances in Cryptology - CRYPTO \u201918 (2018)","DOI":"10.1007\/978-3-319-96884-1_12"},{"key":"7_CR46","doi-asserted-by":"publisher","unstructured":"Kamara, S., Moataz, T., Park, A., Qin, L.: A Decentralized and Encrypted National Gun Registry. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1520\u20131537 (May 2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00072, https:\/\/ieeexplore.ieee.org\/document\/9519474, iSSN: 2375-1207","DOI":"10.1109\/SP40001.2021.00072"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1223\u20131240. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00029"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: Response-hiding encrypted ranges: revisiting security via parametrized leakage-abuse attacks. In: IEEE Symposium on Security and Privacy. S &P (2021)","DOI":"10.1109\/SP40001.2021.00044"},{"key":"7_CR49","unstructured":"Lacharit\u00e9, M., Minaud, B., Paterson, K.G.: Improved reconstruction attacks on encrypted data using range query leakage. IACR Cryptology ePrint Archive 2017, 701 (2017). http:\/\/eprint.iacr.org\/2017\/701"},{"key":"7_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-319-96881-0_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"KG Larsen","year":"2018","unstructured":"Larsen, K.G., Nielsen, J.B.: Yes, there is an oblivious ram lower bound! In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 523\u2013542. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_18"},{"key":"7_CR51","unstructured":"Lehmkuhl, R., Henzinger, A., Corrigan-Gibbs, H.: Distributional private information retrieval. In: 34th USENIX Security Symposium (USENIX Security 25), pp. 3377\u20133393. USENIX Association, Seattle, WA (Aug 2025). https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/lehmkuhl"},{"key":"7_CR52","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L., Wang, M., Tan, Y.A.: Search pattern leakage in searchable encryption: Attacks and new construction. Inf. Sci. 265, 176\u2013188 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.11.021","journal-title":"Inf. Sci."},{"issue":"4","key":"7_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3626760","volume":"1","author":"S Maiyya","year":"2023","unstructured":"Maiyya, S., Vemula, S.C., Agrawal, D., El Abbadi, A., Kerschbaum, F.: Waffle: an online oblivious datastore for protecting data access patterns. Proc. ACM Manage. Data 1(4), 1\u201325 (2023)","journal-title":"Proc. ACM Manage. Data"},{"key":"7_CR54","doi-asserted-by":"publisher","unstructured":"Markatou, E.A., Falzon, F., Espiritu, Z., Tamassia, R.: Attacks on encrypted response-hiding range search schemes in multiple dimensions. Proc. Priv. Enhanc. Technol. 2023(4), 204\u2013223 (2023). https:\/\/doi.org\/10.56553\/popets-2023-0106","DOI":"10.56553\/popets-2023-0106"},{"key":"7_CR55","doi-asserted-by":"publisher","unstructured":"Ohrimenko, O., Goodrich, M.T., Tamassia, R., Upfal, E.: The Melbourne shuffle: improving oblivious storage in the cloud. In: Esparza, J., Fraigniaud, P., Husfeldt, T., Koutsoupias, E. (eds.) ICALP 2014. LNCS, vol. 8573, pp. 556\u2013567. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43951-7_47","DOI":"10.1007\/978-3-662-43951-7_47"},{"key":"7_CR56","unstructured":"Oya, S., Kerschbaum, F.: $$\\{$$IHOP$$\\}$$: Improved statistical query recovery against searchable symmetric encryption through quadratic optimization. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 2407\u20132424 (2022)"},{"key":"7_CR57","doi-asserted-by":"crossref","unstructured":"Pappas, V., et al.: Blind seer: A scalable private DBMs. In: Security and Privacy (SP), 2014 IEEE Symposium on, pp. 359\u2013374. IEEE (2014)","DOI":"10.1109\/SP.2014.30"},{"key":"7_CR58","doi-asserted-by":"publisher","unstructured":"Patel, S., Persiano, G., Yeo, K.: CacheShuffle: a family of oblivious shuffles. In: Chatzigiannakis, I., Kaklamanis, C., Marx, D., Sannella, D. (eds.) 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018). Leibniz International Proceedings in Informatics (LIPIcs), vol.\u00a0107, pp. 161:1\u2013161:13. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany (2018). https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2018.161, https:\/\/drops.dagstuhl.de\/entities\/document\/10.4230\/LIPIcs.ICALP.2018.161","DOI":"10.4230\/LIPIcs.ICALP.2018.161"},{"key":"7_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-030-56784-2_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"S Patel","year":"2020","unstructured":"Patel, S., Persiano, G., Yeo, K.: Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 433\u2013463. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_15"},{"key":"7_CR60","doi-asserted-by":"publisher","unstructured":"Patel, S., Persiano, G., Yeo, K., Yung, M.: Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pp. 79\u201393. ACM (2019). https:\/\/doi.org\/10.1145\/3319535.3354213","DOI":"10.1145\/3319535.3354213"},{"key":"7_CR61","doi-asserted-by":"crossref","unstructured":"Persiano, G., Yeo, K.: Limits of breach-resistant and snapshot-oblivious rams. Cryptology ePrint Archive (2023)","DOI":"10.1007\/978-3-031-38551-3_6"},{"key":"7_CR62","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: IEEE Symposium on Research in Security and Privacy, pp. 44\u201355. IEEE Computer Society (2000)"},{"key":"7_CR63","doi-asserted-by":"crossref","unstructured":"Stefanov, E., et al.: Path oram: an extremely simple oblivious ram protocol. In: ACM Conference on Computer and Communications Security (CCS \u201913) (2013)","DOI":"10.1145\/2508859.2516660"},{"key":"7_CR64","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: Network and Distributed System Security Symposium (NDSS \u201914) (2014)","DOI":"10.14722\/ndss.2014.23298"},{"key":"7_CR65","doi-asserted-by":"crossref","unstructured":"Wang, J., Chow, S.S.: Simple storage-saving structure for volume-hiding encrypted multi-maps: (a slot in need is a slot indeed). In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 63\u201383. Springer (2021)","DOI":"10.1007\/978-3-030-81242-3_4"},{"key":"7_CR66","doi-asserted-by":"crossref","unstructured":"Wang, J., Sun, S.F., Li, T., Qi, S., Chen, X.: Practical volume-hiding encrypted multi-maps with optimal overhead and beyond. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2825\u20132839 (2022)","DOI":"10.1145\/3548606.3559345"},{"key":"7_CR67","doi-asserted-by":"publisher","unstructured":"Wang, J., Sun, S.F., Li, T., Qi, S., Chen, X.: practical volume-hiding encrypted multi-maps with optimal overhead and beyond. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2825\u20132839. CCS \u201922, Association for Computing Machinery, New York, NY, USA (Nov 2022). https:\/\/doi.org\/10.1145\/3548606.3559345","DOI":"10.1145\/3548606.3559345"},{"key":"7_CR68","doi-asserted-by":"publisher","unstructured":"Wang, X.S., et al.: Oblivious data structures. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 215\u2013226. CCS \u201914, Association for Computing Machinery, New York, NY, USA (Nov 2014). https:\/\/doi.org\/10.1145\/2660267.2660314","DOI":"10.1145\/2660267.2660314"},{"key":"7_CR69","unstructured":"Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: USENIX Security Symposium (2016)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5096-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:36Z","timestamp":1765106676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5096-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819550951","9789819550968"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5096-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}