{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T04:58:49Z","timestamp":1770267529021,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS 192528"],"award-info":[{"award-number":["CNS 192528"]}]},{"name":"NSF","award":["CNS 1928767"],"award-info":[{"award-number":["CNS 1928767"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417275","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"443-460","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Full Database Reconstruction in Two Dimensions"],"prefix":"10.1145","author":[{"given":"Francesca","family":"Falzon","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Evangelia Anna","family":"Markatou","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"family":"Akshima","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"David","family":"Cash","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Adam","family":"Rivkin","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Jesse","family":"Stern","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Roberto","family":"Tamassia","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236217"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Alexandra Boldyreva Nathan Chenette Younho Lee and Adam O'Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009 .  Alexandra Boldyreva Nathan Chenette Younho Lee and Adam O'Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009 .","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Alexandra Boldyreva Nathan Chenette and Adam O'Neill. 2011. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Advances in Cryptology -- CRYPTO 2011 .  Alexandra Boldyreva Nathan Chenette and Adam O'Neill. 2011. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Advances in Cryptology -- CRYPTO 2011 .","DOI":"10.1007\/978-3-642-22792-9_33"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_2_7_1","volume-title":"Proc. of ACM Conf. on Computer and Communications Security 2018 (CCS","author":"Chamani Javad Ghareh","year":"2018","unstructured":"Javad Ghareh Chamani , Dimitrios Papadopoulos , Charalampos Papamanthou , and Rasool Jalili . 2018 . New Constructions for Forward and Backward Private Symmetric Searchable Encryption . In Proc. of ACM Conf. on Computer and Communications Security 2018 (CCS 2018). Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In Proc. of ACM Conf. on Computer and Communications Security 2018 (CCS 2018)."},{"key":"e_1_3_2_2_8_1","volume-title":"Structured Encryption and Controlled Disclosure. Advances in Cryptology -- ASIACRYPT 2010","author":"Chase Melissa","unstructured":"Melissa Chase and Seny Kamara . 2010. Structured Encryption and Controlled Disclosure. Advances in Cryptology -- ASIACRYPT 2010 . Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. Advances in Cryptology -- ASIACRYPT 2010 ."},{"key":"e_1_3_2_2_9_1","unstructured":"Ciphercloud. 2020. CipherCloud: Cloud Data Security Company. (2020). http:\/\/www.ciphercloud.com Accessed on May 3 2020.  Ciphercloud. 2020. CipherCloud: Cloud Data Security Company. (2020). http:\/\/www.ciphercloud.com Accessed on May 3 2020."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_2_11_1","volume-title":"Dynamic Searchable Encryption with Small Client Storage. In 27th Annual Network and Distributed System Security Symposium 2020 (NDSS","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis , Javad Ghareh Chamani , Dimitrios Papadopoulos , and Charalampos Papamanthou . 2020 a . Dynamic Searchable Encryption with Small Client Storage. In 27th Annual Network and Distributed System Security Symposium 2020 (NDSS 2020). Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2020 a. Dynamic Searchable Encryption with Small Client Storage. In 27th Annual Network and Distributed System Security Symposium 2020 (NDSS 2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou , and Saurabh Shintre . 2020 b. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage . In 29th USENIX Security Symposium (USENIX Security 20) . Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020 b. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In 29th USENIX Security Symposium (USENIX Security 20) ."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978379"},{"key":"e_1_3_2_2_14_1","volume-title":"Rich Queries on Encrypted Data: Beyond Exact Matches. In 20th European Symposium on Research in Computer Security 2015 (ESORICS","author":"Faber Sky","year":"2015","unstructured":"Sky Faber , Stanislaw Jarecki , Hugo Krawczyk , Quan Nguyen , Marcel-Catalin Rosu , and Michael Steiner . 2015 . Rich Queries on Encrypted Data: Beyond Exact Matches. In 20th European Symposium on Research in Computer Security 2015 (ESORICS 2015). Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In 20th European Symposium on Research in Computer Security 2015 (ESORICS 2015)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.10"},{"key":"e_1_3_2_2_16_1","volume-title":"TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology - CRYPTO 2016 .","author":"Garg Sanjam","year":"2016","unstructured":"Sanjam Garg , Payman Mohassel , and Charalampos Papamanthou . 2016 . TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology - CRYPTO 2016 . Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology - CRYPTO 2016 ."},{"key":"e_1_3_2_2_17_1","volume-title":"Pancake: Frequency Smoothing for Encrypted Data Stores. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Grubbs Paul","year":"2020","unstructured":"Paul Grubbs , Anurag Khandelwal , Marie-Sarah Lacharit\u00e9 , Lloyd Brown , Lucy Li , Rachit Agarwal , and Thomas Ristenpart . 2020 . Pancake: Frequency Smoothing for Encrypted Data Stores. In 29th USENIX Security Symposium (USENIX Security 20) . Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharit\u00e9 , Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart. 2020. Pancake: Frequency Smoothing for Encrypted Data Stores. In 29th USENIX Security Symposium (USENIX Security 20) ."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. ACM Conf. on Computer and Communications Security 2018 (CCS","author":"Grubbs Paul","year":"2018","unstructured":"Paul Grubbs , Marie-Sarah Lacharit\u00e9 , Brice Minaud , and Kenneth G. Paterson . 2018. Pump Up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries . In Proc. ACM Conf. on Computer and Communications Security 2018 (CCS 2018 ). Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Pump Up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In Proc. ACM Conf. on Computer and Communications Security 2018 (CCS 2018)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In Advances in Cryptology -- ASIACRYPT 2018 .  Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In Advances in Cryptology -- ASIACRYPT 2018 .","DOI":"10.1007\/978-3-030-03326-2_6"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00015"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_2"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_12"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749455"},{"key":"e_1_3_2_2_31_1","volume-title":"Proc. ACM Conf. on Computer and Communications Security 2015 (CCS","author":"Naveed Muhammad","year":"2015","unstructured":"Muhammad Naveed , Seny Kamara , and Charles V. Wright . 2015. Inference Attacks on Property-Preserving Encrypted Databases . In Proc. ACM Conf. on Computer and Communications Security 2015 (CCS 2015 ). Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Proc. ACM Conf. on Computer and Communications Security 2015 (CCS 2015)."},{"key":"e_1_3_2_2_32_1","volume-title":"Skyhigh Networks. (2020). https:\/\/www.skyhighnetworks.com accessed on","author":"Networks Skyhigh","year":"2020","unstructured":"Skyhigh Networks . 2020. Skyhigh Networks. (2020). https:\/\/www.skyhighnetworks.com accessed on May 3, 2020 . Skyhigh Networks. 2020. Skyhigh Networks. (2020). https:\/\/www.skyhighnetworks.com accessed on May 3, 2020."},{"key":"e_1_3_2_2_33_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation 2016 (OSDI","author":"Papadimitriou Antonis","year":"2016","unstructured":"Antonis Papadimitriou , Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Andreas Haeberlen , Harmeet Singh , Abhishek Modi , and Saikrishna Badrinarayanan . 2016 . Big Data Analytics over Encrypted Datasets with Seabed . In 12th USENIX Symposium on Operating Systems Design and Implementation 2016 (OSDI 2016). Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed. In 12th USENIX Symposium on Operating Systems Design and Implementation 2016 (OSDI 2016)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342641"},{"key":"e_1_3_2_2_35_1","volume-title":"Hari Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing. In Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles 2011 (SOSP '11)","author":"Popa Raluca Ada","unstructured":"Raluca Ada Popa , Catherine M. S. Redfield , Nickolai Zeldovich , and Hari Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing. In Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles 2011 (SOSP '11) . Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing. In Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles 2011 (SOSP '11)."},{"key":"e_1_3_2_2_36_1","volume-title":"CRAWDAD dataset spitz\/cellular (v. 2011-05-04). Downloaded from https:\/\/crawdad.org\/spitz\/cellular\/20110504. (May","author":"Spitz Malte","year":"2011","unstructured":"Malte Spitz . 2011. CRAWDAD dataset spitz\/cellular (v. 2011-05-04). Downloaded from https:\/\/crawdad.org\/spitz\/cellular\/20110504. (May 2011 ). Malte Spitz. 2011. CRAWDAD dataset spitz\/cellular (v. 2011-05-04). Downloaded from https:\/\/crawdad.org\/spitz\/cellular\/20110504. (May 2011)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590305"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417275","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:31Z","timestamp":1750197691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":34,"alternative-id":["10.1145\/3372297.3417275","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417275","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}