{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:01:05Z","timestamp":1773511265254,"version":"3.50.1"},"reference-count":113,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833611","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2450-2468","source":"Crossref","is-referenced-by-count":60,"title":["Waldo: A Private Time-Series Database from Function Secret Sharing"],"prefix":"10.1109","author":[{"given":"Emma","family":"Dauterman","sequence":"first","affiliation":[{"name":"University of California,Berkeley"}]},{"given":"Mayank","family":"Rathee","sequence":"additional","affiliation":[{"name":"University of California,Berkeley"}]},{"given":"Raluca Ada","family":"Popa","sequence":"additional","affiliation":[{"name":"University of California,Berkeley"}]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[{"name":"University of California,Berkeley"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1198\/106186005X47714"},{"key":"ref56","first-page":"12","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation","volume":"20","author":"islam","year":"2012","journal-title":"NDSS"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"ref53","article-title":"InfluxData","year":"0","journal-title":"Time series database explained"},{"key":"ref52","article-title":"InfluxDB","year":"0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_6"},{"key":"ref54","article-title":"InfluxDB","year":"0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.114"},{"key":"ref50","article-title":"Crypsh: A novel iot data protection scheme based on bgn cryptosystem","author":"halder","year":"2021","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.10"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"ref8","first-page":"39","article-title":"Btrdb: Optimizing storage system design for timeseries processing","author":"andersen","year":"2016","journal-title":"USENIX FAST"},{"key":"ref7","article-title":"Amazon Timestream","year":"0"},{"key":"ref9","author":"druid","year":"0"},{"key":"ref4","article-title":"Multi-Protocol SPDZ: Versatile framework for multi-party computation","year":"2021"},{"key":"ref3","article-title":"libPSI","year":"0"},{"key":"ref6","article-title":"Prio+: Privacy preserving aggregate statistics via boolean shares","author":"addanki","year":"2021","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref5","article-title":"SEAL-ORAM","year":"0"},{"key":"ref100","year":"0","journal-title":"How Everactive powers a dense sensor network with virtually no power at all"},{"key":"ref101","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"ref35","first-page":"5:1","article-title":"Use your brain! arithmetic 3pc for any modulus with active security","author":"eerikson","year":"2020","journal-title":"In ITC volume 163 of LIPIcs"},{"key":"ref34","first-page":"211","article-title":"The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci","volume":"9","author":"dwork","year":"2014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660280"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/spe.513"},{"key":"ref30","first-page":"1101","article-title":"DORY: An Encrypted Search System with Distributed Trust","author":"dauterman","year":"2020","journal-title":"Proc of USENIX OSDI"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133967"},{"key":"ref32","article-title":"SEAL: Attack mitigation for encrypted databases via adjustable leakage","author":"demertzis","year":"2020","journal-title":"Proc USENIX Security07"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358651"},{"key":"ref38","first-page":"123","article-title":"Rich queries on encrypted data: Beyond exact matches","author":"faber","year":"2015","journal-title":"Proceedings of European Symposium on Research in Computer Security"},{"key":"ref24","article-title":"Clevabit","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref26","first-page":"259","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","author":"corrigan-gibbs","year":"2017","journal-title":"USENIX NSDI"},{"key":"ref25","article-title":"Network bandwidth","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57990-6_11"},{"key":"ref22","first-page":"387","article-title":"Zeph: Cryptographic enforcement of end-to-end data privacy","author":"burkhalter","year":"2021","journal-title":"Proc of USENIX OSDI"},{"key":"ref21","first-page":"835","article-title":"Timecrypt: Encrypted data stream processing at scale with cryptographic access control","author":"burkhalter","year":"2020","journal-title":"USENIX NSDI"},{"key":"ref28","first-page":"643","article-title":"Multiparty computation from somewhat homomorphic encryption","author":"damg\u00e5rd","year":"2012","journal-title":"J Cryptologv"},{"key":"ref27","first-page":"769","article-title":"PDZ2k: Efficient MPC mod 2k for dishonest majority","author":"cramer","year":"2018","journal-title":"Journal of Cryptology (2)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516944"},{"key":"ref13","article-title":"Efficient multiparty protocols using circuit randomization","author":"beaver","year":"1991","journal-title":"J Cryptologv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9733-y"},{"key":"ref96","year":"0"},{"key":"ref11","year":"0","journal-title":"Amazon ec2 on-demand pricing"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00098"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9733-y"},{"key":"ref17","first-page":"337","article-title":"Function secret sharing","author":"boyle","year":"2015","journal-title":"EUROCRYPT?94"},{"key":"ref16","first-page":"871","article-title":"Function secret sharing for mixed-mode and fixed-point secure computation","author":"boyle","year":"2021","journal-title":"EUROCRYPT?94"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36030-6_14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809723"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131697"},{"key":"ref95","year":"0"},{"key":"ref94","first-page":"1","article-title":"Privacy-preserving aggregation of time-series data","volume":"2","author":"shi","year":"2011","journal-title":"In Proc NDSS"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1002\/ccr3.1573"},{"key":"ref90","article-title":"Payroll data for 29,000 facebook employees stolen","author":"reichert","year":"2019"},{"key":"ref89","year":"0","journal-title":"Prometheus"},{"key":"ref86","year":"0","journal-title":"Examples of remote patient monitoring 9 top patient applications"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"ref87","year":"0","journal-title":"Remote Monitoring of Peak Expiratory Flow"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342641"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"ref84","doi-asserted-by":"crossref","DOI":"10.1109\/EuroSP48549.2020.00030","article-title":"Practical volume-based attacks on encrypted databases","author":"poddar","year":"2020"},{"key":"ref83","article-title":"Senate: A maliciously-secure MPC platform for collaborative analytics","author":"poddar","year":"2021","journal-title":"Proc USENIX Security07"},{"key":"ref80","first-page":"587","article-title":"Big data analytics over encrypted datasets with seabed","volume":"16","author":"papadimitriou","year":"2016","journal-title":"Proc of USENIX OSDI"},{"key":"ref79","article-title":"Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption","author":"oya","year":"2021","journal-title":"Proc USENIX Security07"},{"key":"ref108","article-title":"Ben-or, michael and goldwasser, shafi and wigderson, avi","author":"wigderson","year":"1988","journal-title":"STOC"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055079"},{"key":"ref106","first-page":"299","article-title":"Splinter: Practical private queries on public data","author":"wang","year":"2017","journal-title":"USENIX NSDI"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"ref75","year":"0"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0052"},{"key":"ref74","article-title":"Medicare and Medicaid Programs; Policy and Regulatory Revisions in Response to the COVID-19 Public Health Emergency","year":"0"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"},{"key":"ref77","article-title":"Fortune 500 company leaked 264gb of client, payment data","author":"osborne","year":"2019"},{"key":"ref102","year":"0","journal-title":"What is time-series data?"},{"key":"ref76","year":"0"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"ref2","article-title":"cryptoTools","year":"0"},{"key":"ref1","article-title":"Amazon EC2 instance network bandwidth","year":"2021"},{"key":"ref71","first-page":"35","article-title":"Aby3: A mixed protocol framework for machine learning","author":"mohassel","year":"2018","journal-title":"ACM CCSW"},{"key":"ref111","first-page":"707","article-title":"All your queries are belong to us: The power of file-injection attacks on searchable encryption","author":"zhang","year":"2016","journal-title":"Proc USENIX Security07"},{"key":"ref70","article-title":"Efficient private statistics with succinct sketches","author":"melis","year":"2015","journal-title":"arXiv preprint arXiv 1508 06110"},{"key":"ref112","first-page":"283","article-title":"Opaque: An oblivious and encrypted distributed analytics platform","author":"zheng","year":"2017","journal-title":"USENIX NSDI"},{"key":"ref73","article-title":"Russian government hackers penetrated DNC, stole opposition research on Trump","author":"nakashima","year":"2016"},{"key":"ref72","article-title":"Time Series Data and MongoDB","author":"mongo","year":"0"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref68","article-title":"Swedish healthcare advice line stored 2.7 million patient phone calls on unprotected web server","author":"lovell","year":"2019"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-319-57048-8_6","article-title":"How to simulate it - A tutorial on the simulation proof technique","author":"lindell","year":"2017","journal-title":"Tutorials on the Foundations of Cryptography"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2196\/resprot.6167"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_10"},{"key":"ref66","article-title":"Secrecy: Secure collaborative analytics on secret-shared data","author":"liagouris","year":"2021","journal-title":"arXiv preprint arXiv 2102 01048"},{"key":"ref113","article-title":"Efficient and privacy-preserving similarity range query over encrypted time series data","author":"zheng","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880026"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03511-1_3"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00044"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833611.pdf?arnumber=9833611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:11:38Z","timestamp":1699485098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833611\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":113,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833611","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}