{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:02:00Z","timestamp":1777734120747,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council","award":["FP7\/2007-2013 Grant Agreement no. 339563 -- CryptoCloud"],"award-info":[{"award-number":["FP7\/2007-2013 Grant Agreement no. 339563 -- CryptoCloud"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978303","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1143-1154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":186,"title":["\u2211o\u03c6o\u03c2"],"prefix":"10.1145","author":[{"given":"Raphael","family":"Bost","sequence":"first","affiliation":[{"name":"Direction G\u00e9n\u00e9rale de l'Armement - Ma\u00eetrise de l'Information &amp; Universit\u00e9 de Rennes 1, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897562"},{"key":"e_1_3_2_1_3_1","volume-title":"Implementation of $\\sophos$","author":"Bost R.","year":"2016","unstructured":"Bost , R. Implementation of $\\sophos$ ( 2016 ). prefixhttps:\/\/gitlab.com\/sse\/sophos. Bost, R. Implementation of $\\sophos$ (2016). prefixhttps:\/\/gitlab.com\/sse\/sophos."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_6_1","unstructured":"Cloud. Cloud data encryption. prefixhttp:\/\/www.ciphercloud.com\/technologies\/encryption\/.  Cloud. Cloud data encryption. prefixhttp:\/\/www.ciphercloud.com\/technologies\/encryption\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_20"},{"key":"e_1_3_2_1_12_1","unstructured":"Facebook Inc. RocksDB: A Persistent Key-Value Store for Flash and RAM Storage. (June 2016). http:\/\/rocksdb.org.  Facebook Inc. RocksDB: A Persistent Key-Value Store for Flash and RAM Storage. (June 2016). http:\/\/rocksdb.org."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/975541"},{"key":"e_1_3_2_1_16_1","unstructured":"Google Inc. gRPC: A high performance open source general RPC framework that puts mobile and HTTP\/2 first. (April 2016). prefixhttp:\/\/www.grpc.io\/.  Google Inc. gRPC: A high performance open source general RPC framework that puts mobile and HTTP\/2 first. (April 2016). prefixhttp:\/\/www.grpc.io\/."},{"key":"e_1_3_2_1_17_1","volume-title":"NDSS 2012","author":"Islam M.S.","year":"2012","unstructured":"Islam , M.S. , Kuzu , M. , and Kantarcioglu , M . Access pattern disclosure on searchable encryption: Ramification, attack and mitigation . In: NDSS 2012 . The Internet Society ( Feb. 2012 ). Islam, M.S., Kuzu, M., and Kantarcioglu, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: NDSS 2012. The Internet Society (Feb. 2012)."},{"key":"e_1_3_2_1_18_1","unstructured":"Intel. Intel\u00ae SSD 750 Series: Performance Unleashed. http:\/\/www.intel.com\/content\/www\/us\/en\/solid-state-drives\/solid-state-drives-750-series.html.  Intel. Intel\u00ae SSD 750 Series: Performance Unleashed. http:\/\/www.intel.com\/content\/www\/us\/en\/solid-state-drives\/solid-state-drives-750-series.html."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516730"},{"key":"e_1_3_2_1_20_1","first-page":"285","volume-title":"UC-secure searchable symmetric encryption","author":"Kurosawa K.","year":"2012","unstructured":"Kurosawa , K. and Ohtaki , Y . UC-secure searchable symmetric encryption . In: A.D. Keromytis (ed.), FC 2012 , LNCS, vol. 7397 , pp. 285 -- 298 . Springer , Heidelberg (Feb. \/ Mar. 2012). Kurosawa, K. and Ohtaki, Y. UC-secure searchable symmetric encryption. In: A.D. Keromytis (ed.), FC 2012, LNCS, vol. 7397, pp. 285--298. Springer, Heidelberg (Feb. \/ Mar. 2012)."},{"key":"e_1_3_2_1_21_1","first-page":"258","volume-title":"FC 2013, LNCS","volume":"7859","author":"Kamara S.","year":"2013","unstructured":"Kamara , S. and Papamanthou , C . Parallel and dynamic searchable symmetric encryption. In: A.R. Sadeghi (ed.) , FC 2013, LNCS , vol. 7859 , pp. 258 -- 274 . Springer, Heidelberg ( Apr. 2013 ). Kamara, S. and Papamanthou, C. Parallel and dynamic searchable symmetric encryption. In: A.R. Sadeghi (ed.), FC 2013, LNCS, vol. 7859, pp. 258--274. Springer, Heidelberg (Apr. 2013)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813672"},{"key":"e_1_3_2_1_24_1","first-page":"147","volume-title":"FC 2015, LNCS","volume":"8975","author":"Moataz T.","year":"2015","unstructured":"Moataz , T. , Mayberry , T. , Blass , E.O. , and Chan , A.H . Resizable tree-based oblivious RAM. In: R. B\u00f6hme and T. Okamoto (eds.) , FC 2015, LNCS , vol. 8975 , pp. 147 -- 167 . Springer, Heidelberg ( Jan. 2015 ). Moataz, T., Mayberry, T., Blass, E.O., and Chan, A.H. Resizable tree-based oblivious RAM. In: R. B\u00f6hme and T. Okamoto (eds.), FC 2015, LNCS, vol. 8975, pp. 147--167. Springer, Heidelberg (Jan. 2015)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"e_1_3_2_1_27_1","unstructured":"skyhigh. Cloud security and enablement. https:\/\/www.skyhighnetworks.com.  skyhigh. Cloud security and enablement. https:\/\/www.skyhighnetworks.com."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_1_29_1","first-page":"44","volume-title":"2000 IEEE Symposium on Security and Privacy","author":"Song D.X.","year":"2000","unstructured":"Song , D.X. , Wagner , D. , and Perrig , A . Practical techniques for searches on encrypted data . In: 2000 IEEE Symposium on Security and Privacy , pp. 44 -- 55 . IEEE Computer Society Press ( May 2000 ). Song, D.X., Wagner, D., and Perrig, A. Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44--55. IEEE Computer Society Press (May 2000)."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:16Z","timestamp":1750222576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978303"}},"subtitle":["Forward Secure Searchable Encryption"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":26,"alternative-id":["10.1145\/2976749.2978303","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978303","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}