{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:13Z","timestamp":1767339913989,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447838","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"131-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Don't fool yourself with Forward Privacy, Your queries STILL belong to us!"],"prefix":"10.1145","author":[{"given":"Khosro","family":"Salmani","sequence":"first","affiliation":[{"name":"Mount Royal University, Calgary, AB, Canada"}]},{"given":"Ken","family":"Barker","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Enron Dataset. https:\/\/www.cs.cmu.edu\/.\/enron\/. Accessed:2020-09  Enron Dataset. https:\/\/www.cs.cmu.edu\/.\/enron\/. Accessed:2020-09"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.45"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0002"},{"key":"e_1_3_2_2_8_1","first-page":"216","article-title":"Secure indexes","volume":"2003","author":"Goh Eu-Jin","year":"2003","unstructured":"Eu-Jin Goh 2003 . Secure indexes . IACR Cryptology ePrint Archive , Vol. 2003 (2003), 216 . Eu-Jin Goh et al. 2003. Secure indexes. IACR Cryptology ePrint Archive, Vol. 2003 (2003), 216.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.008"},{"key":"e_1_3_2_2_10_1","volume-title":"Vol.","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.. In Ndss , Vol. , Vol. 20 . Citeseer, 12. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.. In Ndss, Vol., Vol. 20. Citeseer, 12."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_2_12_1","volume-title":"Generic Multi-keyword Ranked Search on Encrypted Cloud Data. In European Symposium on Research in Computer Security. Springer, 322--343","author":"Kermanshahi Shabnam Kasra","year":"2019","unstructured":"Shabnam Kasra Kermanshahi , Joseph K Liu , Ron Steinfeld , and Surya Nepal . 2019 . Generic Multi-keyword Ranked Search on Encrypted Cloud Data. In European Symposium on Research in Computer Security. Springer, 322--343 . Shabnam Kasra Kermanshahi, Joseph K Liu, Ron Steinfeld, and Surya Nepal. 2019. Generic Multi-keyword Ranked Search on Encrypted Cloud Data. In European Symposium on Research in Computer Security. Springer, 322--343."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.021"},{"key":"e_1_3_2_2_14_1","volume-title":"Multi-user verifiable searchable symmetric encryption for cloud storage","author":"Liu Xueqiao","year":"2018","unstructured":"Xueqiao Liu , Guomin Yang , Yi Mu , and Robert Deng . 2018. Multi-user verifiable searchable symmetric encryption for cloud storage . IEEE Transactions on Dependable and Secure Computing ( 2018 ). Xueqiao Liu, Guomin Yang, Yi Mu, and Robert Deng. 2018. Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"e_1_3_2_2_17_1","volume-title":"Dynamic Searchable Symmetric Encryption with Full Forward Privacy. 2020 IEEE International Conference on Information Security and Privacy Protection","author":"Salmani Khosro","year":"2020","unstructured":"Khosro Salmani and Ken Barker . 2020 a . Dynamic Searchable Symmetric Encryption with Full Forward Privacy. 2020 IEEE International Conference on Information Security and Privacy Protection (2020), 985--995. Khosro Salmani and Ken Barker. 2020 a. Dynamic Searchable Symmetric Encryption with Full Forward Privacy. 2020 IEEE International Conference on Information Security and Privacy Protection (2020), 985--995."},{"key":"e_1_3_2_2_18_1","first-page":"79","article-title":"b. Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"1","author":"Salmani Khosro","year":"2020","unstructured":"Khosro Salmani and Ken Barker . 2020 b. Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data . Journal of Surveillance, Security and Safety , Vol. 1 , 1 (2020), 79 -- 101 . Khosro Salmani and Ken Barker. 2020 b. Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data. Journal of Surveillance, Security and Safety, Vol. 1, 1 (2020), 79--101.","journal-title":"Journal of Surveillance, Security and Safety"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_2_20_1","volume-title":"Forward private searchable symmetric encryption with optimized I\/O efficiency","author":"Song Xiangfu","year":"2018","unstructured":"Xiangfu Song , Changyu Dong , Dandan Yuan , Qiuliang Xu , and Minghao Zhao . 2018. Forward private searchable symmetric encryption with optimized I\/O efficiency . IEEE Transactions on Dependable and Secure Computing ( 2018 ). Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao. 2018. Forward private searchable symmetric encryption with optimized I\/O efficiency. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_2_21_1","volume-title":"Vol.","volume":"71","author":"Stefanov Emil","year":"2014","unstructured":"Emil Stefanov , Charalampos Papamanthou , and Elaine Shi . 2014 . Practical Dynamic Searchable Encryption with Small Leakage.. In NDSS , Vol. , Vol. 71 . 72--75. Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage.. In NDSS, Vol., Vol. 71. 72--75."},{"key":"e_1_3_2_2_22_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang , Jonathan Katz , and Charalampos Papamanthou . 2016 . All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/zhang Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/zhang"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":22,"alternative-id":["10.1145\/3422337.3447838","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447838","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}