{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:08:23Z","timestamp":1775912903503,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243821","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1002-1019","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Private Stateful Information Retrieval"],"prefix":"10.1145","author":[{"given":"Sarvar","family":"Patel","sequence":"first","affiliation":[{"name":"Google LLC, Mountain View, CA, USA"}]},{"given":"Giuseppe","family":"Persiano","sequence":"additional","affiliation":[{"name":"Google LLC, Mountain View, CA, USA"}]},{"given":"Kevin","family":"Yeo","sequence":"additional","affiliation":[{"name":"Google LLC, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0010"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_2_4_1","unstructured":"Sebastian Angel and Srinath TV Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure.. In OSDI. 551--569.   Sebastian Angel and Srinath TV Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure.. In OSDI. 551--569."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704119"},{"key":"e_1_3_2_2_6_1","unstructured":"Daniel J Bernstein. 2002. PIPPENGER'S EXPONENTIATION ALGORITHM. (2002).  Daniel J Bernstein. 2002. PIPPENGER'S EXPONENTIATION ALGORITHM. (2002)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70503-3_22"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_2_10_1","volume-title":"Annual cryptology conference","author":"Brakerski Zvika"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70503-3_23"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/648118.746742"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380240306"},{"key":"e_1_3_2_2_17_1","volume-title":"Fisher and Frank Yates","author":"Ronald","year":"1948","edition":"3"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_65"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978407"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_7"},{"key":"e_1_3_2_2_23_1","volume-title":"Lorenzo Alvisi, and Michael Walfish.","author":"Gupta Trinabh","year":"2016"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0036"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007396"},{"key":"e_1_3_2_2_27_1","volume-title":"Addition of El Gamal Plaintexts. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 346--358","author":"Jakobsson Markus","year":"2000"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2017.11.017"},{"key":"e_1_3_2_2_29_1","volume-title":"Salim El Rouayheb, and Alex Sprintson","author":"Kadhe Swanand","year":"2017"},{"key":"e_1_3_2_2_30_1","first-page":"1077","article-title":"Blurry-ORAM: A Multi-Client Oblivious Storage Architecture","volume":"2016","author":"Karvelas Nikolaos P","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_31_1","volume-title":"Paul C Van Oorschot, and Scott A Vanstone","author":"Katz Jonathan","year":"1996"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796363"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.28"},{"key":"e_1_3_2_2_36_1","volume-title":"Modular multiplication without trial division. Mathematics of computation","author":"Montgomery Peter L","year":"1985"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_17"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IREPGELC.1954.6499441"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_41_1","volume-title":"Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, 20--29","author":"Mihai"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1954.1057465"},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings, Part I, Ran Canetti and Juan A. Garay (Eds.). 392--409","author":"Ristenpart Thomas","year":"2013"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2009.3.13"},{"key":"e_1_3_2_2_45_1","first-page":"806","article-title":"Addition chains of vectors (problem 5125)","volume":"70","author":"Straus Ernst G.","year":"1964","journal-title":"American Mathematical Monthly"},{"key":"e_1_3_2_2_46_1","first-page":"73","article-title":"MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services","volume":"2016","author":"Zhang Jinsheng","year":"2016","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:19Z","timestamp":1750212499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":41,"alternative-id":["10.1145\/3243734.3243821","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243821","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}