{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:22:18Z","timestamp":1770358938902,"version":"3.49.0"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1350888"],"award-info":[{"award-number":["CCF-1350888"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ACI-1443046"],"award-info":[{"award-number":["ACI-1443046"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1514520"],"award-info":[{"award-number":["CNS-1514520"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564287"],"award-info":[{"award-number":["CNS-1564287"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1718834"],"award-info":[{"award-number":["CNS-1718834"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1816149"],"award-info":[{"award-number":["IIS-1816149"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CDS&E-1953350"],"award-info":[{"award-number":["CDS&E-1953350"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Visa Research and Microsoft Research PhD Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2022,12,1]]},"DOI":"10.1109\/tkde.2021.3060757","type":"journal-article","created":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T23:51:54Z","timestamp":1614037914000},"page":"5741-5754","source":"Crossref","is-referenced-by-count":15,"title":["Efficient Oblivious Query Processing for Range and kNN Queries"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6846-7614","authenticated-orcid":false,"given":"Zhao","family":"Chang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi&#x0027;an, Shaanxi, China"}]},{"given":"Dong","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Feifei","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, Zhejiang, China"}]},{"given":"Jeff M.","family":"Phillips","sequence":"additional","affiliation":[{"name":"School of Computing, University of Utah, Salt Lake City, UT, USA"}]},{"given":"Rajeev","family":"Balasubramonian","sequence":"additional","affiliation":[{"name":"School of Computing, University of Utah, Salt Lake City, UT, USA"}]}],"member":"263","reference":[{"key":"ref73","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","author":"wang","year":"2017","journal-title":"Proc USENIX Conf Secur Symp"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00082"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319891"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3136068"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref38","first-page":"217","article-title":"Strong and efficient cache side-channel protection using hardware transactional memory","author":"gruss","year":"2017","journal-title":"Proc USENIX Conf Secur Symp"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212352"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407814"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835932"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_27"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882911"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035948"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882932"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.20"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064057"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813649"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660365"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497553"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"673","DOI":"10.14778\/3055330.3055334","article-title":"SMCQL: Secure query processing for private data networks","volume":"10","author":"bater","year":"2017","journal-title":"Proc VLDB Endowment"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387552"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2467797"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref22","first-page":"197","article-title":"Oblivious RAM with $O$O$((\\log {N})^3)$((logN)3) worst-case cost","author":"shi","year":"2011","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref21","article-title":"Towards practical oblivious RAM","author":"stefanov","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382299"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.25"},{"key":"ref25","first-page":"199","article-title":"Shroud: Ensuring private access to large-scale data in the data center","author":"lorch","year":"2013","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"ref51","article-title":"Usable PIR","author":"williams","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.122"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14778\/2733085.2733100"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816687"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816688"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920920"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_27"},{"key":"ref52","first-page":"727","article-title":"Obladi: Oblivious serializable transactions in the cloud","author":"crooks","year":"2018","journal-title":"Proc 13th USENIX Conf Operating Syst Des Implementation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588572"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994528"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"key":"ref12","first-page":"283","article-title":"Opaque: An oblivious and encrypted distributed analytics platform","author":"zheng","year":"2017","journal-title":"Proc Usenix Conf Netw Syst Des Implementation"},{"key":"ref13","first-page":"26","article-title":"Oblivious query processing","author":"arasu","year":"2014","journal-title":"Proc Int Conf Database Theory"},{"key":"ref14","article-title":"Efficient oblivious data structures for database services on the cloud","volume":"2017","author":"hoang","year":"2017","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref15","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation","author":"islam","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498254"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.38"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824090"},{"key":"ref8","first-page":"216","article-title":"Executing SQL over encrypted data in the database-service-provider model","author":"hacig\u00fcm\u00fcs","year":"2002","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588893"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00044"},{"key":"ref9","first-page":"733","article-title":"Secure nearest neighbor revisited","author":"yao","year":"2013","journal-title":"Proc IEEE 29th Int Conf Data Eng"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23320"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"ref48","first-page":"2433","article-title":"SEAL: Attack mitigation for encrypted databases via adjustable leakage","author":"demertzis","year":"2020","journal-title":"Proc Usenix Secur Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"ref41","first-page":"415","article-title":"Constants count: Practical improvements to oblivious RAM","author":"ren","year":"2015","journal-title":"Proc USENIX Conf Secur Symp"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/69\/9941016\/9360469-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/9941016\/09360469.pdf?arnumber=9360469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T16:52:18Z","timestamp":1667926338000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9360469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,1]]},"references-count":76,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2021.3060757","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,1]]}}}