{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:35:00Z","timestamp":1764570900176,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":106,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T00:00:00Z","timestamp":1590883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Advanced Research Projects Agency","award":["N66001-15-C-4067"],"award-info":[{"award-number":["N66001-15-C-4067"]}]},{"name":"NSF","award":["1408982"],"award-info":[{"award-number":["1408982"]}]},{"DOI":"10.13039\/100006503","name":"Space and Naval Warfare Systems Command","doi-asserted-by":"publisher","award":["N66001-15-C-4067"],"award-info":[{"award-number":["N66001-15-C-4067"]}],"id":[{"id":"10.13039\/100006503","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,11]]},"DOI":"10.1145\/3318464.3380596","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T17:12:33Z","timestamp":1590772353000},"page":"603-619","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Crypt\u03f5"],"prefix":"10.1145","author":[{"given":"Amrita","family":"Roy Chowdhury","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Chenghong","family":"Wang","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Xi","family":"He","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,5,31]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Google cloud platform. https:\/\/cloud.google.com.  Google cloud platform. https:\/\/cloud.google.com."},{"key":"e_1_3_2_2_2_1","unstructured":"https:\/\/github.com\/emp-toolkit.  https:\/\/github.com\/emp-toolkit."},{"key":"e_1_3_2_2_3_1","unstructured":"https:\/\/github.com\/encryptogroup\/aby.  https:\/\/github.com\/encryptogroup\/aby."},{"key":"e_1_3_2_2_4_1","unstructured":"https:\/\/github.com\/kuleuven-cosic\/scale-mamba.  https:\/\/github.com\/kuleuven-cosic\/scale-mamba."},{"key":"e_1_3_2_2_5_1","unstructured":"http:\/\/www.multipartycomputation.com\/mpc-software.  http:\/\/www.multipartycomputation.com\/mpc-software."},{"key":"e_1_3_2_2_6_1","unstructured":"Full version of the paper 2019. https:\/\/arxiv.org\/abs\/1902.07756.  Full version of the paper 2019. https:\/\/arxiv.org\/abs\/1902.07756."},{"key":"e_1_3_2_2_7_1","volume-title":"Uci machine learning repository","author":"Asuncion A.","year":"2010","unstructured":"A. Asuncion and D. Newman . Uci machine learning repository , 2010 . A.Asuncion and D. Newman. Uci machine learning repository, 2010."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20170627"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"e_1_3_2_2_10_1","volume-title":"Encrypted databases for differential privacy","author":"Agarwal A.","year":"2018","unstructured":"A. Agarwal , M. Herlihy , S. Kamara , and T. Moataz . Encrypted databases for differential privacy , 2018 . https:\/\/eprint.iacr.org\/2018\/860. A. Agarwal, M. Herlihy, S. Kamara, and T. Moataz. Encrypted databases for differential privacy, 2018. https:\/\/eprint.iacr.org\/2018\/860."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0049-3"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_31"},{"key":"e_1_3_2_2_13_1","volume-title":"ESORICS","author":"Barbosa M.","year":"2017","unstructured":"M. Barbosa , D. Catalano , and D. Fiore . Labeled homomorphic encryption - scalable and privacy-preserving processing of outsourced data . In ESORICS , 2017 . M. Barbosa, D. Catalano, and D. Fiore. Labeled homomorphic encryption - scalable and privacy-preserving processing of outsourced data. In ESORICS, 2017."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646760.706018"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_25"},{"key":"e_1_3_2_2_18_1","volume-title":"Distributed private data analysis: On simultaneously solving how and what. CoRR, abs\/1103.2626","author":"Beimel A.","year":"2011","unstructured":"A. Beimel , K. Nissim , and E. Omri . Distributed private data analysis: On simultaneously solving how and what. CoRR, abs\/1103.2626 , 2011 . A. Beimel, K. Nissim, and E. Omri. Distributed private data analysis: On simultaneously solving how and what. CoRR, abs\/1103.2626, 2011."},{"key":"e_1_3_2_2_19_1","volume-title":"Private learning and sanitization: Pure vs. approximate differential privacy. CoRR, abs\/1407.2674","author":"Beimel A.","year":"2014","unstructured":"A. Beimel , K. Nissim , and U. Stemmer . Private learning and sanitization: Pure vs. approximate differential privacy. CoRR, abs\/1407.2674 , 2014 . A. Beimel, K. Nissim, and U. Stemmer. Private learning and sanitization: Pure vs. approximate differential privacy. CoRR, abs\/1407.2674, 2014."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_2_22_1","volume-title":"Optimized homomorphic encryption solution for secure genome-wide association studies. IACR Cryptology ePrint Archive","author":"Blatt M.","year":"2019","unstructured":"M. Blatt , A. Gusev , Y. Polyakov , K. Rohloff , and V. Vaikuntanathan . Optimized homomorphic encryption solution for secure genome-wide association studies. IACR Cryptology ePrint Archive , 2019 :223, 2019. M. Blatt, A. Gusev, Y. Polyakov, K. Rohloff, and V. Vaikuntanathan. Optimized homomorphic encryption solution for secure genome-wide association studies. IACR Cryptology ePrint Archive, 2019:223, 2019."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.67"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57339-7_11"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756135"},{"key":"e_1_3_2_2_26_1","volume-title":"Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive","author":"Chabanne H.","year":"2017","unstructured":"H. Chabanne , A. de Wargny , J. Milgram , C. Morel , and E. Prouff . Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive , 2017 :35, 2017. H. Chabanne, A. de Wargny, J. Milgram, C. Morel, and E. Prouff. Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive, 2017:35, 2017."},{"key":"e_1_3_2_2_27_1","volume-title":"Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge. IACR Cryptology ePrint Archive","author":"Chaidos P.","year":"2017","unstructured":"P. Chaidos and G. Couteau . Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge. IACR Cryptology ePrint Archive , 2017 :1029, 2017. P. Chaidos and G. Couteau. Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge. IACR Cryptology ePrint Archive, 2017:1029, 2017."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3310435.3310585"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33090-2_25"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243750"},{"key":"e_1_3_2_2_32_1","volume-title":"Distributed differential privacy via mixnets. CoRR, abs\/1808.01394","author":"Cheu A.","year":"2018","unstructured":"A. Cheu , A. D. Smith , J. Ullman , D. Zeber , and M. Zhilyaev . Distributed differential privacy via mixnets. CoRR, abs\/1808.01394 , 2018 . A. Cheu, A. D. Smith, J. Ullman, D. Zeber, and M. Zhilyaev. Distributed differential privacy via mixnets. CoRR, abs\/1808.01394, 2018."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714621"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_2_39_1","volume-title":"Aug.","author":"Dwork C.","year":"2014","unstructured":"C. Dwork and A. Roth . The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., 9(3&\u20134):211--407 , Aug. 2014 . C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., 9(3&\u20134):211--407, Aug. 2014."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_2_41_1","volume-title":"Featherweight pinq","author":"Ebadi H.","year":"2015","unstructured":"H. Ebadi and D. Sands . Featherweight pinq , 2015 . H. Ebadi and D. Sands. Featherweight pinq, 2015."},{"key":"e_1_3_2_2_42_1","volume-title":"Amplification by shuffling: From local to central differential privacy via anonymity. CoRR, abs\/1811.12469","author":"Feldman V.","year":"2018","unstructured":"\u00da. Erlingsson, V. Feldman , I. Mironov , A. Raghunathan , K. Talwar , and A. Thakurta . Amplification by shuffling: From local to central differential privacy via anonymity. CoRR, abs\/1811.12469 , 2018 . \u00da. Erlingsson, V. Feldman, I. Mironov, A. Raghunathan, K. Talwar, and A. Thakurta. Amplification by shuffling: From local to central differential privacy via anonymity. CoRR, abs\/1811.12469, 2018."},{"key":"e_1_3_2_2_43_1","volume-title":"CCS","author":"Pihur V.","year":"2014","unstructured":"\u00da. Erlingsson, V. Pihur , and A. Korolova . Rappor: Randomized aggregatable privacy-preserving ordinal response . In CCS , 2014 . \u00da. Erlingsson, V. Pihur, and A. Korolova. Rappor: Randomized aggregatable privacy-preserving ordinal response. In CCS, 2014."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_2_45_1","volume-title":"Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries","author":"Fanti G.","year":"2015","unstructured":"G. Fanti , V. Pihur , and \u00dalfar Erlingsson . Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries , 2015 . G. Fanti, V. Pihur, and \u00dalfar Erlingsson. Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries, 2015."},{"key":"e_1_3_2_2_46_1","volume-title":"Secure linear regression on vertically partitioned datasets. IACR Cryptology ePrint Archive","author":"Gasc\u00f3n A.","year":"2016","unstructured":"A. Gasc\u00f3n , P. Schoppmann , B. Balle , M. Raykova , J. Doerner , S. Zahur , and D. Evans . Secure linear regression on vertically partitioned datasets. IACR Cryptology ePrint Archive , 2016 :892, 2016. A. Gasc\u00f3n, P. Schoppmann, B. Balle, M. Raykova, J. Doerner, S. Zahur, and D. Evans. Secure linear regression on vertically partitioned datasets. IACR Cryptology ePrint Archive, 2016:892, 2016."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300092"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_13"},{"key":"e_1_3_2_2_50_1","volume-title":"Privacy-preserving collaborative prediction using random forests","author":"Giacomelli I.","year":"2018","unstructured":"I. Giacomelli , S. Jha , R. Kleiman , D. Page , and K. Yoon . Privacy-preserving collaborative prediction using random forests , 2018 . I. Giacomelli, S. Jha, R. Kleiman, D. Page, and K. Yoon. Privacy-preserving collaborative prediction using random forests, 2018."},{"key":"e_1_3_2_2_51_1","volume-title":"ICML","author":"Gilad-Bachrach R.","year":"2016","unstructured":"R. Gilad-Bachrach , N. Dowlin , K. Laine , K. E. Lauter , M. Naehrig , and J. R. Wernsing . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In ICML , 2016 . R. Gilad-Bachrach, N. Dowlin, K. Laine, K. E. Lauter, M. Naehrig, and J. R. Wernsing. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In ICML, 2016."},{"key":"e_1_3_2_2_52_1","volume-title":"Wired","author":"Greenberg A.","year":"2016","unstructured":"A. Greenberg . Apple's ` differential privacy' is about collecting your data--but not your data . Wired , Jun 13 2016 . A. Greenberg. Apple's `differential privacy' is about collecting your data--but not your data. Wired, Jun 13 2016."},{"key":"e_1_3_2_2_55_1","first-page":"2339","volume-title":"Proceedings of the 25th International Conference on Neural Information Processing Systems -","volume":"2","author":"Hardt M.","year":"2012","unstructured":"M. Hardt , K. Ligett , and F. McSherry . A simple and practical algorithm for differentially private data release . In Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 2 , NIPS'12, pages 2339 -- 2347 , USA, 2012 . Curran Associates Inc. M. Hardt, K. Ligett, and F. McSherry. A simple and practical algorithm for differentially private data release. In Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 2, NIPS'12, pages 2339--2347, USA, 2012. Curran Associates Inc."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882931"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_3_2_2_61_1","volume-title":"Cryptodl: Deep neural networks over encrypted data","author":"Hesamifard E.","year":"2017","unstructured":"E. Hesamifard , H. Takabi , and M. Ghasemi . Cryptodl: Deep neural networks over encrypted data , 2017 . E. Hesamifard, H. Takabi, and M. Ghasemi. Cryptodl: Deep neural networks over encrypted data, 2017."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.35"},{"key":"e_1_3_2_2_63_1","volume-title":"Practical differential privacy for SQL queries using elastic sensitivity. CoRR, abs\/1706.09479","author":"Johnson N. M.","year":"2017","unstructured":"N. M. Johnson , J. P. Near , and D. X. Song . Practical differential privacy for SQL queries using elastic sensitivity. CoRR, abs\/1706.09479 , 2017 . N. M. Johnson, J. P. Near, and D. X. Song. Practical differential privacy for SQL queries using elastic sensitivity. CoRR, abs\/1706.09479, 2017."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293351"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897875"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/2051002.2051032"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732271"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807104"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055331"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243851"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_2_79_1","volume-title":"abs\/1702.07476","author":"Mironov I.","year":"2017","unstructured":"I. Mironov . Renyi differential privacy. CoRR , abs\/1702.07476 , 2017 . I. Mironov. Renyi differential privacy. CoRR, abs\/1702.07476, 2017."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_2_82_1","first-page":"149","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12","author":"Narayan A.","year":"2012","unstructured":"A. Narayan and A. Haeberlen . Djoin: Differentially private join queries over distributed databases . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12 , pages 149 -- 162 , Berkeley, CA, USA , 2012 . USENIX Association. A. Narayan and A. Haeberlen. Djoin: Differentially private join queries over distributed databases. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12, pages 149--162, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_2_83_1","volume-title":"Collecting and analyzing data from smart device users with local differential privacy. CoRR, abs\/1606.05053","author":"Nguy\u00ean T. T.","year":"2016","unstructured":"T. T. Nguy\u00ean , X. Xiao , Y. Yang , S. C. Hui , H. Shin , and J. Shin . Collecting and analyzing data from smart device users with local differential privacy. CoRR, abs\/1606.05053 , 2016 . T. T. Nguy\u00ean, X. Xiao, Y. Yang, S. C. Hui, H. Shin, and J. Shin. Collecting and analyzing data from smart device users with local differential privacy. CoRR, abs\/1606.05053, 2016."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488652"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.5555\/1804390"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/646756.705507"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556576"},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_2_94_1","volume-title":"Privacy-preserving aggregation of time-series data","author":"Shi E.","year":"2011","unstructured":"E. Shi , T.-H. Hubert Chan , E. G. Rieffel , R. Chow , and D. Song . Privacy-preserving aggregation of time-series data . volume 2 , 01 2011 . E. Shi, T.-H. Hubert Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. volume 2, 01 2011."},{"key":"e_1_3_2_2_95_1","first-page":"991","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium, SEC'18","author":"Bulck J. Van","year":"2018","unstructured":"J. Van Bulck , M. Minkin , O. Weisse , D. Genkin , B. Kasikci , F. Piessens , M. Silberstein , T. F. Wenisch , Y. Yarom , and R. Strackx . Foreshadow: Extracting the keys to the intel sgx kingdom with transient out-of-order execution . In Proceedings of the 27th USENIX Conference on Security Symposium, SEC'18 , pages 991 -- 1008 , Berkeley, CA, USA , 2018 . USENIX Association. J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikci, F. Piessens, M. Silberstein, T. F. Wenisch, Y. Yarom, and R. Strackx. Foreshadow: Extracting the keys to the intel sgx kingdom with transient out-of-order execution. In Proceedings of the 27th USENIX Conference on Security Symposium, SEC'18, pages 991--1008, Berkeley, CA, USA, 2018. USENIX Association."},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241247"},{"key":"e_1_3_2_2_97_1","volume-title":"Locally differentially private heavy hitter identification","author":"Wang T.","year":"2017","unstructured":"T. Wang , N. Li , and S. Jha . Locally differentially private heavy hitter identification , 2017 . T. Wang, N. Li, and S. Jha. Locally differentially private heavy hitter identification, 2017."},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134053"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989348"},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447831"},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.48"},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350252"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699501"},{"key":"e_1_3_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196921"},{"key":"e_1_3_2_2_108_1","first-page":"587","volume-title":"Proceedings of the 2014 SIAM International Conference on Data Mining","author":"Zhang X.","unstructured":"X. Zhang , R. Chen , J. Xu , X. Meng , and Y. Xie . Towards accurate histogram publication under differential privacy . In Proceedings of the 2014 SIAM International Conference on Data Mining , pages 587 -- 595 . X. Zhang, R. Chen, J. Xu, X. Meng, and Y. Xie. Towards accurate histogram publication under differential privacy. In Proceedings of the 2014 SIAM International Conference on Data Mining, pages 587--595."},{"key":"e_1_3_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243742"}],"event":{"name":"SIGMOD\/PODS '20: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Portland OR USA","acronym":"SIGMOD\/PODS '20"},"container-title":["Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3380596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318464.3380596","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318464.3380596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:23Z","timestamp":1750199903000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3380596"}},"subtitle":["Crypto-Assisted Differential Privacy on Untrusted Servers"],"short-title":[],"issued":{"date-parts":[[2020,5,31]]},"references-count":106,"alternative-id":["10.1145\/3318464.3380596","10.1145\/3318464"],"URL":"https:\/\/doi.org\/10.1145\/3318464.3380596","relation":{},"subject":[],"published":{"date-parts":[[2020,5,31]]},"assertion":[{"value":"2020-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}