{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T12:12:07Z","timestamp":1773835927325,"version":"3.50.1"},"reference-count":83,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jisa.2026.104439","type":"journal-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:37:20Z","timestamp":1773776240000},"page":"104439","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Practical and secure history-independent indexing for queryable-encrypted databases"],"prefix":"10.1016","volume":"99","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5714-6927","authenticated-orcid":false,"given":"Mattia","family":"Trabucco","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3671-6927","authenticated-orcid":false,"given":"Mauro","family":"Andreolini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5824-2297","authenticated-orcid":false,"given":"Luca","family":"Ferretti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104439_bib0001","unstructured":"Microsoft. Transparent data encryption. https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/transparent-data-encryption; Vis. May 2025."},{"key":"10.1016\/j.jisa.2026.104439_bib0002","series-title":"Proceedings of the 18th IEEE Int\u2019l conference data engineering","article-title":"Providing database as a service","author":"Hacig\u00fcm\u00fc\u015f","year":"2002"},{"key":"10.1016\/j.jisa.2026.104439_bib0003","series-title":"Proceedings of the 20th privacy enhancing technologies symposium","article-title":"SoK: anatomy of data breaches","author":"Saleem","year":"2020"},{"key":"10.1016\/j.jisa.2026.104439_bib0004","series-title":"Proceedings of the 29th ACM symposium theory of computing","article-title":"Oblivious data structures: applications to cryptography","author":"Micciancio","year":"1997"},{"key":"10.1016\/j.jisa.2026.104439_bib0005","series-title":"18th symposium foundations of computer science","article-title":"On uniquely represented data strauctures","author":"Snyder","year":"1977"},{"key":"10.1016\/j.jisa.2026.104439_bib0006","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1145\/78973.78977","article-title":"Skip lists: a probabilistic alternative to balanced trees","volume":"33","author":"Pugh","year":"1990","journal-title":"Commun ACM"},{"key":"10.1016\/j.jisa.2026.104439_bib0007","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1007\/BF01940876","article-title":"Randomized search trees","volume":"16","author":"Seidel","year":"1996","journal-title":"Algorithmica"},{"key":"10.1016\/j.jisa.2026.104439_bib0008","series-title":"Proceedings of the 23rd ACM CCS","article-title":"Order-revealing encryption: new constructions, applications, and lower bounds","author":"Lewi","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0009","series-title":"Proceedings of the IACR advances in cryptology (EUROCRYPT)","article-title":"Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation","author":"Boneh","year":"2015"},{"key":"10.1016\/j.jisa.2026.104439_bib0010","series-title":"Proceedings of the IACR fast software encryption","article-title":"Practical order-revealing encryption with limited leakage","author":"Chenette","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0011","series-title":"Proceedings of the ASIACRYPT","article-title":"SQL on structurally-encrypted databases","author":"Kamara","year":"2018"},{"key":"10.1016\/j.jisa.2026.104439_bib0012","series-title":"Proceedings of the ITASEC 2023: the italian conf. on cybersecurity","article-title":"How (not) to index order revealing encrypted databases","author":"Ferretti","year":"2023"},{"key":"10.1016\/j.jisa.2026.104439_bib0013","series-title":"Proceedings of the 35th ACM symposium principles of database systems","article-title":"Anti-persistence on persistent storage: history-independent sparse tables and dictionaries","author":"Bender","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0014","series-title":"CRYPTO 2016","article-title":"TWORAM: efficient oblivious ram in two rounds with applications to searchable encryption","author":"Garg","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0015","series-title":"Proceedings of the ASIACRYPT","article-title":"Three-party ORAM for secure computation","author":"Faber","year":"2015"},{"key":"10.1016\/j.jisa.2026.104439_bib0016","series-title":"Proceedings of the ACM CCS","article-title":"Onion ring ORAM: efficient constant bandwidth oblivious RAM from (leveled) TFHE","author":"Chen","year":"2019"},{"key":"10.1016\/j.jisa.2026.104439_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13174-017-0073-0","article-title":"A framework for searching encrypted databases","volume":"9","author":"Alves","year":"2018","journal-title":"J Internet Serv Appl"},{"key":"10.1016\/j.jisa.2026.104439_bib0018","unstructured":"PostgreSQL. Chapter 67.4.3. B-tree indexes. deduplication. https:\/\/postgresql.org\/docs\/16\/btree-implementation.html; Vis. May 2025."},{"key":"10.1016\/j.jisa.2026.104439_bib0019","series-title":"Proceedings of the conference VLDB","article-title":"A comparative evaluation of order-revealing encryption schemes and secure range-query protocols","author":"Bogatov","year":"2019"},{"key":"10.1016\/j.jisa.2026.104439_bib0020","series-title":"Proceedings of the 22nd ACM CCS","article-title":"Inference attacks on property-preserving encrypted databases","author":"Naveed","year":"2015"},{"key":"10.1016\/j.jisa.2026.104439_bib0021","first-page":"1","article-title":"History-independent dynamic partitioning: operation-order privacy in ordered data structures","volume":"2","author":"Bender","year":"2024","journal-title":"Proc ACM Manage Data"},{"key":"10.1016\/j.jisa.2026.104439_bib0022","series-title":"Int\u2019l conference automata, languages, and programming","article-title":"B-treaps: a uniquely represented alternative to b-trees","author":"Golovin","year":"2009"},{"key":"10.1016\/j.jisa.2026.104439_bib0023","series-title":"Int\u2019l conference automata, languages, and programming","article-title":"Deterministic history-independent strategies for storing information on write-once memories","author":"Moran","year":"2007"},{"key":"10.1016\/j.jisa.2026.104439_bib0024","series-title":"Proceedings of the ACM Int\u2019l conference management of data","article-title":"Order preserving encryption for numeric data","author":"Agrawal","year":"2004"},{"key":"10.1016\/j.jisa.2026.104439_bib0025","series-title":"Proc. 23rd ACM symposium operating systems principles","article-title":"CryptDB: protecting confidentiality with encrypted query processing","author":"Popa","year":"2011"},{"key":"10.1016\/j.jisa.2026.104439_bib0026","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/TPDS.2013.154","article-title":"Distributed, concurrent, and independent access to encrypted cloud databases","volume":"25","author":"Ferretti","year":"2014","journal-title":"IEEE Trans Parallel and Distributed Systems"},{"key":"10.1016\/j.jisa.2026.104439_bib0027","series-title":"Proceedings of the 23rd ACM CCS","article-title":"Breaking web applications built on top of encrypted data","author":"Grubbs","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0028","series-title":"IEEE Symposium S&P","article-title":"Leakage-abuse attacks against order-revealing encryption","author":"Grubbs","year":"2017"},{"key":"10.1016\/j.jisa.2026.104439_bib0029","series-title":"Introduction to modern cryptography","isbn-type":"print","author":"Katz","year":"2020","ISBN":"https:\/\/id.crossref.org\/isbn\/9781351133029"},{"key":"10.1016\/j.jisa.2026.104439_bib0030","series-title":"Proc. 30th USENIX security symp.","article-title":"Hiding the access pattern is not enough: exploiting search pattern leakage in searchable encryption","author":"Oya","year":"2021"},{"key":"10.1016\/j.jisa.2026.104439_bib0031","series-title":"Proceedings of the 17th USENIX symposium OSDI","article-title":"Encrypted databases made secure yet maintainable","author":"Li","year":"2023"},{"key":"10.1016\/j.jisa.2026.104439_bib0032","first-page":"229","article-title":"Characterizing history independent data structures","volume":"2518","author":"Hartline","year":"2005","journal-title":"Algorithmica"},{"key":"10.1016\/j.jisa.2026.104439_bib0033","series-title":"Proceedings of the 33rd ACM symposium theory of computing","article-title":"Anti-persistence: history independent data structures","author":"Naor","year":"2001"},{"key":"10.1016\/j.jisa.2026.104439_bib0034","first-page":"1664","article-title":"Arx: an encrypted database using semantically secure encryption","volume":"12","author":"Poddar","year":"2016","journal-title":"Cryptology ePrint Arch"},{"key":"10.1016\/j.jisa.2026.104439_bib0035","unstructured":"Project T.E.. ENcrypted query operations. https:\/\/enquo.org; Vis. May 2025a."},{"key":"10.1016\/j.jisa.2026.104439_bib0036","unstructured":"Project T.E.. PG_Enquo reduced security mode. https:\/\/github.com\/enquo\/pg_enquo\/tree\/main\/doc\/data_types; Vis. May 2025b."},{"key":"10.1016\/j.jisa.2026.104439_bib0037","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/TCC.2014.2314644","article-title":"Performance and cost evaluation of an adaptive encryption architecture for cloud databases","volume":"2","author":"Ferretti","year":"2014","journal-title":"IEEE Trans Cloud Comput"},{"key":"10.1016\/j.jisa.2026.104439_bib0038","series-title":"Proceedings of the 16th workshop hot topics in operating systems","article-title":"Why your encrypted database is not secure","author":"Grubbs","year":"2017"},{"key":"10.1016\/j.jisa.2026.104439_bib0039","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-319-57048-8_6","article-title":"How to simulate it\u2013a tutorial on the simulation proof technique","volume":"0","author":"Lindell","year":"2017","journal-title":"Tutorials Found Cryptography"},{"key":"10.1016\/j.jisa.2026.104439_bib0040","series-title":"Proceedings of the conference VLDB","article-title":"Processing analytical queries over encrypted data","author":"Tu","year":"2013"},{"key":"10.1016\/j.jisa.2026.104439_bib0041","doi-asserted-by":"crossref","first-page":"370","DOI":"10.2478\/popets-2019-0052","article-title":"StealthDB: a scalable encrypted database with full SQL query support","volume":"2019","author":"Vinayagamurthy","year":"2019","journal-title":"Proc Privacy Enhancing Technol"},{"key":"10.1016\/j.jisa.2026.104439_bib0042","series-title":"Proceedings of the ACM Int\u2019l conference management of data","article-title":"Azure SQL database always encrypted","author":"Antonopoulos","year":"2020"},{"key":"10.1016\/j.jisa.2026.104439_bib0043","unstructured":"CipherStash. Order-revealing encryption library. https:\/\/github.com\/cipherstash\/ore.rs; Vis. May 2025."},{"key":"10.1016\/j.jisa.2026.104439_bib0044","unstructured":"LLC A.W.S.. Aws govcloud. https:\/\/aws.amazon.com\/govcloud-us\/; Vis. May 2025."},{"key":"10.1016\/j.jisa.2026.104439_bib0045","unstructured":"MongoDB I.. MongoDB queryable encryption. https:\/\/www.mongodb.com\/docs\/manual\/core\/queryable-encryption; Vis. May 2025."},{"key":"10.1016\/j.jisa.2026.104439_bib0046","series-title":"IEEE Symposium S&P","article-title":"SoK: Cryptographically protected database search","author":"Fuller","year":"2017"},{"key":"10.1016\/j.jisa.2026.104439_bib0047","series-title":"Proceedings of the 41st ACM symposium theory of computing","article-title":"Fully homomorphic encryption using ideal lattices","author":"Gentry","year":"2009"},{"key":"10.1016\/j.jisa.2026.104439_bib0048","series-title":"Proceedings of the 34th ACM symposium applied computing","article-title":"The lord shares: combining attribute-based encryption and searchable encryption for flexible data sharing","author":"Michalas","year":"2019"},{"key":"10.1016\/j.jisa.2026.104439_bib0049","series-title":"Proceedings of the 22nd ACM CCS","article-title":"Frequency-hiding order-preserving encryption","author":"Kerschbaum","year":"2015"},{"key":"10.1016\/j.jisa.2026.104439_bib0050","doi-asserted-by":"crossref","first-page":"417","DOI":"10.56553\/popets-2023-0025","article-title":"Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption","volume":"2023","author":"Amjad","year":"2023","journal-title":"Proc Privacy Enhancing Technol"},{"key":"10.1016\/j.jisa.2026.104439_bib0051","series-title":"Proceedings of the 33rd Int\u2019l conference VLDB","article-title":"Over-encryption: management of access control evolution on outsourced data","author":"De Capitani","year":"2007"},{"key":"10.1016\/j.jisa.2026.104439_bib0052","series-title":"IEEE 5th Int\u2019l conference cloud computing technology and science","article-title":"Access control enforcement on query-aware encrypted cloud databases","author":"Ferretti","year":"2013"},{"key":"10.1016\/j.jisa.2026.104439_bib0053","series-title":"IEEE Conference distributed computing systems","article-title":"A distributed access control system for cloud federations","author":"Alansari","year":"2017"},{"key":"10.1016\/j.jisa.2026.104439_bib0054","series-title":"Data privacy management and autonomous spontaneous security: 7th Int\u2019l workshop DPM and SETOP","article-title":"AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing","author":"Hadavi","year":"2013"},{"key":"10.1016\/j.jisa.2026.104439_bib0055","series-title":"Proceedings of the 12th ACM ASIACCS","article-title":"EncKV: an encrypted key-value store with rich queries","author":"Yuan","year":"2017"},{"key":"10.1016\/j.jisa.2026.104439_bib0056","series-title":"Proceedings of the ACM Int\u2019l conference management of data","article-title":"Executing SQL over encrypted data in the database-service-provider model","author":"Hacig\u00fcm\u00fc\u015f","year":"2002"},{"key":"10.1016\/j.jisa.2026.104439_bib0057","series-title":"Proceedings of the 10th ACM CCS","article-title":"Balancing confidentiality and efficiency in untrusted relational DBMSs","author":"Damiani","year":"2003"},{"key":"10.1016\/j.jisa.2026.104439_bib0058","series-title":"Proceedings of the ASIACRYPT","article-title":"Structured encryption and controlled disclosure","author":"Chase","year":"2010"},{"key":"10.1016\/j.jisa.2026.104439_bib0059","series-title":"Network and distributed system security symposium","article-title":"Efficient private file retrieval by combining ORAM and PIR","author":"Mayberry","year":"2014"},{"key":"10.1016\/j.jisa.2026.104439_bib0060","series-title":"IEEE Symposium S&P","article-title":"EnclaveDB: a secure database using SGX","author":"Priebe","year":"2018"},{"key":"10.1016\/j.jisa.2026.104439_bib0061","series-title":"51st IEEE\/IFIP Int\u2019l conference dependable systems and networks","article-title":"EncDBDB: searchable encrypted, fast, compressed, in-memory database using enclaves","author":"Fuhry","year":"2021"},{"key":"10.1016\/j.jisa.2026.104439_bib0062","series-title":"Proceedings of the 2011 ACM Int\u2019l conference management of data","article-title":"TrustedDB: a trusted hardware based database with privacy and data confidentiality","author":"Bajaj","year":"2011"},{"key":"10.1016\/j.jisa.2026.104439_bib0063","series-title":"Conference innovative data systems research","article-title":"Orthogonal security with cipherbase","author":"Arasu","year":"2013"},{"key":"10.1016\/j.jisa.2026.104439_bib0064","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3456631","article-title":"Security vulnerabilities of SGX and countermeasures: a survey","volume":"54","author":"Fei","year":"2021","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.jisa.2026.104439_bib0065","series-title":"Network and distributed system security symposium","article-title":"Access pattern disclosure on searchable encryption: ramification, attack and mitigation","author":"Islam","year":"2012"},{"key":"10.1016\/j.jisa.2026.104439_bib0066","series-title":"Proceedings of the 23rd ACM CCS","article-title":"What else is revealed by order-revealing encryption?","author":"Durak","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0067","doi-asserted-by":"crossref","unstructured":"Bindschaedler V., Grubbs P., Cash D., Ristenpart T., Shmatikov V.. The tao of inference in privacy-protected databases. 2018; 11, 1715\u20131728.","DOI":"10.14778\/3236187.3236217"},{"key":"10.1016\/j.jisa.2026.104439_bib0068","series-title":"Proceedings of the 27th ACM CCS","article-title":"Full database reconstruction in two dimensions","author":"Falzon","year":"2020"},{"key":"10.1016\/j.jisa.2026.104439_bib0069","series-title":"IEEE Symposium S&P","article-title":"The state uniform: attacks on encrypted databases beyond the uniform query distribution","author":"Kornaropoulos","year":"2020"},{"key":"10.1016\/j.jisa.2026.104439_bib0070","series-title":"Proceedings of the ACM CCS","article-title":"Generic attacks on secure outsourced databases","author":"Kellaris","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0071","series-title":"IEEE Symposium S&P","article-title":"Improved reconstruction attacks on encrypted data using range query leakage","author":"Lacharit\u00e9","year":"2018"},{"key":"10.1016\/j.jisa.2026.104439_bib0072","series-title":"Proceedings of the ACM CCS","article-title":"Pump up the volume: practical database reconstruction from volume leakage on range queries","author":"Grubbs","year":"2018"},{"key":"10.1016\/j.jisa.2026.104439_bib0073","series-title":"32nd USENIX security symposium","article-title":"Security analysis of MongoDB queryable encryption","author":"Gui","year":"2023"},{"key":"10.1016\/j.jisa.2026.104439_bib0074","series-title":"NDSS","article-title":"Cryptographic methods for storing ballots on a voting machine","author":"Bethencourt","year":"2007"},{"key":"10.1016\/j.jisa.2026.104439_bib0075","series-title":"Proceedings of the 20th ACM CCS","article-title":"HIFS: history independence for file systems","author":"Bajaj","year":"2013"},{"key":"10.1016\/j.jisa.2026.104439_bib0076","series-title":"Proceedings of the 21st european symp. research in computer security (ESORICS)","article-title":"More practical and secure history-independent hash tables","author":"Goodrich","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0077","series-title":"Proceedings of the ACM ASIACCS","article-title":"EHIFS: an efficient history independent file system","author":"Gao","year":"2019"},{"key":"10.1016\/j.jisa.2026.104439_bib0078","doi-asserted-by":"crossref","unstructured":"Golovin D.. The B-skip-list: a simpler uniquely represented alternative to B-trees. 2010arXiv: 10050662.","DOI":"10.1007\/978-3-642-02927-1_41"},{"key":"10.1016\/j.jisa.2026.104439_bib0079","series-title":"Proceedings of the 36th ACM symposium principles of database systems","article-title":"Write-optimized skip lists","author":"Bender","year":"2017"},{"key":"10.1016\/j.jisa.2026.104439_bib0080","series-title":"IEEE 29th Int\u2019l conference data engineering","article-title":"FickleBase: looking into the future to erase the past","author":"Bajaj","year":"2013"},{"key":"10.1016\/j.jisa.2026.104439_bib0081","series-title":"IEEE Symposium S&P","article-title":"A practical oblivious map data structure with secure deletion and history independence","author":"Roche","year":"2016"},{"key":"10.1016\/j.jisa.2026.104439_bib0082","doi-asserted-by":"crossref","DOI":"10.1145\/3177872","article-title":"Path ORAM: an extremely simple oblivious RAM protocol","author":"Stefanov","year":"2018","journal-title":"J. ACM"},{"key":"10.1016\/j.jisa.2026.104439_bib0083","series-title":"34th USENIX security symposium","article-title":"{V-ORAM}: A versatile and adaptive {ORAM} framework with service transformation for dynamic workloads","author":"Zhang","year":"2025"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000694?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000694?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T08:58:42Z","timestamp":1773824322000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":83,"alternative-id":["S2214212626000694"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104439","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Practical and secure history-independent indexing for queryable-encrypted databases","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104439","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104439"}}