{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:15:21Z","timestamp":1757542521573,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,20]]},"DOI":"10.1145\/3357223.3362732","type":"proceedings-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T18:15:00Z","timestamp":1573496100000},"page":"287-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Repeatable Oblivious Shuffling of Large Outsourced Data Blocks"],"prefix":"10.1145","author":[{"given":"Zhilin","family":"Zhang","sequence":"first","affiliation":[{"name":"Simon Fraser University, AWS Security"}]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"Simon Fraser University"}]},{"given":"Weipeng","family":"Lin","sequence":"additional","affiliation":[{"name":"Simon Fraser University"}]},{"given":"Ada Wai-Chee","family":"Fu","sequence":"additional","affiliation":[{"name":"CUHK"}]},{"given":"Raymond Chi-Wing","family":"Wong","sequence":"additional","affiliation":[{"name":"HKUST"}]}],"member":"320","published-online":{"date-parts":[[2019,11,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_30"},{"key":"e_1_3_2_1_3_1","first-page":"1749","article-title":"From Keys to Databases---Real-World Applications of Secure Multi-Party","volume":"61","author":"Archer David W","year":"2018","unstructured":"David W Archer , Dan Bogdanov , Yehuda Lindell , Liina Kamm , Kurt Nielsen , Jakob Illeborg Pagter , Nigel P Smart , and Rebecca N Wright . 2018 . From Keys to Databases---Real-World Applications of Secure Multi-Party Computation. Comput. J. 61 , 12 (2018), 1749 -- 1771 . David W Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P Smart, and Rebecca N Wright. 2018. From Keys to Databases---Real-World Applications of Secure Multi-Party Computation. Comput. J. 61, 12 (2018), 1749--1771.","journal-title":"Computation. Comput. J."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.38"},{"volume-title":"Annual Privacy Forum","author":"Bogdanov Dan","key":"e_1_3_2_1_5_1","unstructured":"Dan Bogdanov , Liina Kamm , Sven Laur , Pille Pruulmann-Vengerfeldt , Riivo Talviste , and Jan Willemson . 2014. Privacy-preserving statistical data analysis on federated databases . In Annual Privacy Forum . Springer , 30--55. Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt, Riivo Talviste, and Jan Willemson. 2014. Privacy-preserving statistical data analysis on federated databases. In Annual Privacy Forum. Springer, 30--55."},{"key":"e_1_3_2_1_6_1","volume-title":"The challenges of data quality and data quality assessment in the big data era. Data Science Journal 14","author":"Cai Li","year":"2015","unstructured":"Li Cai and Yangyong Zhu . 2015. The challenges of data quality and data quality assessment in the big data era. Data Science Journal 14 ( 2015 ). Li Cai and Yangyong Zhu. 2015. The challenges of data quality and data quality assessment in the big data era. Data Science Journal 14 (2015)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_3_2_1_8_1","unstructured":"Crypto++ community. 2019. Crypto++. https:\/\/www.cryptopp.com\/.  Crypto++ community. 2019. Crypto++. https:\/\/www.cryptopp.com\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.37"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_6"},{"volume-title":"Abstract algebra","author":"Dummit David Steven","key":"e_1_3_2_1_11_1","unstructured":"David Steven Dummit and Richard M Foote . 2004. Abstract algebra . Vol. 3 . Wiley Hoboken . David Steven Dummit and Richard M Foote. 2004. Abstract algebra. Vol. 3. Wiley Hoboken."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591830"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133604"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc.NDSS'12","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access Pattern disclosure on searchable encryption: ramification, attack and mitigation . In Proc.NDSS'12 . 12. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on searchable encryption: ramification, attack and mitigation. In Proc.NDSS'12. 12."},{"key":"e_1_3_2_1_16_1","first-page":"272","article-title":"Outsourcing Multi-Party Computation","volume":"2011","author":"Kamara Seny","year":"2011","unstructured":"Seny Kamara , Payman Mohassel , and Mariana Raykova . 2011 . Outsourcing Multi-Party Computation . IACR Cryptology ePrint Archive 2011 (2011), 272 . Seny Kamara, Payman Mohassel, and Mariana Raykova. 2011. Outsourcing Multi-Party Computation. IACR Cryptology ePrint Archive 2011 (2011), 272.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_18"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. WOSIS'04","author":"Lin Ping","year":"2004","unstructured":"Ping Lin and K Sel\u00e7uk Candan . 2004 . Hiding traversal of tree structured data from untrusted data stores . In Proc. WOSIS'04 . 314. Ping Lin and K Sel\u00e7uk Candan. 2004. Hiding traversal of tree structured data from untrusted data stores. In Proc. WOSIS'04. 314."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124441"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124441"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00040"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2016.2"},{"volume-title":"Abelian Groups and Modules","author":"Mutzbauer Otto","key":"e_1_3_2_1_24_1","unstructured":"Otto Mutzbauer . 1999. Normal forms of matrices with applications to almost completely decomposable groups . In Abelian Groups and Modules . Springer , 121--134. Otto Mutzbauer. 1999. Normal forms of matrices with applications to almost completely decomposable groups. In Abelian Groups and Modules. Springer, 121--134."},{"key":"e_1_3_2_1_25_1","volume-title":"Introduction to number theory. New York","author":"Nagell Trygve","year":"1951","unstructured":"Trygve Nagell . 1951. Introduction to number theory. New York ( 1951 ). Trygve Nagell. 1951. Introduction to number theory. New York (1951)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43951-7_47"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. USENIX Security'16","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi-Party Machine Learning on Trusted Processors .. In Proc. USENIX Security'16 . 619--636. Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors.. In Proc. USENIX Security'16. 619--636."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_30_1","volume-title":"CacheShuffle: An Oblivious Shuffle Algorithm Using Caches. arXiv preprint arXiv:1705.07069","author":"Patel Sarvar","year":"2017","unstructured":"Sarvar Patel , Giuseppe Persiano , and Kevin Yeo . 2017. CacheShuffle: An Oblivious Shuffle Algorithm Using Caches. arXiv preprint arXiv:1705.07069 ( 2017 ). Sarvar Patel, Giuseppe Persiano, and Kevin Yeo. 2017. CacheShuffle: An Oblivious Shuffle Algorithm Using Caches. arXiv preprint arXiv:1705.07069 (2017)."},{"key":"e_1_3_2_1_31_1","first-page":"2046","article-title":"Efficiently outsourcing multiparty computation under multiple keys","volume":"8","author":"Peter Andreas","year":"2013","unstructured":"Andreas Peter , Erik Tews , and Stefan Katzenbeisser . 2013 . Efficiently outsourcing multiparty computation under multiple keys . TIFS 8 , 12 (2013), 2046 -- 2058 . Andreas Peter, Erik Tews, and Stefan Katzenbeisser. 2013. Efficiently outsourcing multiparty computation under multiple keys. TIFS 8, 12 (2013), 2046--2058.","journal-title":"TIFS"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2009.08.014"},{"key":"e_1_3_2_1_33_1","volume-title":"Coinshuffle: Practical decentralized coin mixing for bitcoin. In Proc. ESORICS'14","author":"Ruffing Tim","year":"2014","unstructured":"Tim Ruffing , Pedro Moreno-Sanchez , and Aniket Kate . 2014 . Coinshuffle: Practical decentralized coin mixing for bitcoin. In Proc. ESORICS'14 . Springer , 345--364. Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. Coinshuffle: Practical decentralized coin mixing for bitcoin. In Proc. ESORICS'14. Springer, 345--364."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134095"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.radonc.2014.10.001"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906153"},{"key":"e_1_3_2_1_37_1","unstructured":"Marc Tiehuis. [n.d.]. libhcs. https:\/\/github.com\/tiehuis\/libhcs.  Marc Tiehuis. [n.d.]. libhcs. https:\/\/github.com\/tiehuis\/libhcs."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498254"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. CIKM '19","author":"Zhilin Zhang","year":"2019","unstructured":"Zhang Zhilin , Wang Ke , Lin Weipeng , Fu Ada Wai-Chee , and Wong Raymond Chi-Wing . 2019 . Practical Access Pattern Privacy by Combining PIR and Oblivious Shuffle . In Proc. CIKM '19 . ACM. Zhang Zhilin, Wang Ke, Lin Weipeng, Fu Ada Wai-Chee, and Wong Raymond Chi-Wing. 2019. Practical Access Pattern Privacy by Combining PIR and Oblivious Shuffle. In Proc. CIKM '19. ACM."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.018"}],"event":{"name":"SoCC '19: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Santa Cruz CA USA","acronym":"SoCC '19"},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357223.3362732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357223.3362732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:44Z","timestamp":1750202024000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357223.3362732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":40,"alternative-id":["10.1145\/3357223.3362732","10.1145\/3357223"],"URL":"https:\/\/doi.org\/10.1145\/3357223.3362732","relation":{},"subject":[],"published":{"date-parts":[[2019,11,20]]},"assertion":[{"value":"2019-11-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}