{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:15:54Z","timestamp":1773774954453,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457308","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:37Z","timestamp":1624036957000},"page":"2182-2194","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["VeriDB: An SGX-based Verifiable Database"],"prefix":"10.1145","author":[{"given":"Wenchao","family":"Zhou","sequence":"first","affiliation":[{"name":"Georgetown University &amp; Alibaba Group, Washington, DC, USA"}]},{"given":"Yifan","family":"Cai","sequence":"additional","affiliation":[{"name":"University of Pennsylvania &amp; Alibaba Group, Philadelphia, PA, USA"}]},{"given":"Yanqing","family":"Peng","sequence":"additional","affiliation":[{"name":"University of Utah &amp; Alibaba Group, Salt Lake City, UT, USA"}]},{"given":"Sheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Singapore, Singapore"}]},{"given":"Ke","family":"Ma","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Feifei","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064030"},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan OtextquoterightKeeffe , Mark L. Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'16) . USENIX Association, 689--703. Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan OtextquoterightKeeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'16). USENIX Association, 689--703."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST'19)","author":"Bailleu Maurice","year":"2019","unstructured":"Maurice Bailleu , J\u00f6rg Thalheim , Pramod Bhatotia , Christof Fetzer , Michio Honda , and Kapil Vaswani . 2019 . SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution . In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST'19) . USENIX Association, 173--190. Maurice Bailleu, J\u00f6rg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution. In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST'19). USENIX Association, 173--190."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536349.2536353"},{"key":"e_1_3_2_2_5_1","volume-title":"Checking the Correctness of Memories. In 32nd Annual Symposium on Foundations of Computer Science","author":"Blum Manuel","year":"1991","unstructured":"Manuel Blum , William S. Evans , Peter Gemmell , Sampath Kannan , and Moni Naor . 1991 . Checking the Correctness of Memories. In 32nd Annual Symposium on Foundations of Computer Science , San Juan, Puerto Rico, 1- -4 October 1991. IEEE Computer Society, 90--99. Manuel Blum, William S. Evans, Peter Gemmell, Sampath Kannan, and Moni Naor. 1991. Checking the Correctness of Memories. In 32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1--4 October 1991. IEEE Computer Society, 90--99."},{"key":"e_1_3_2_2_6_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive , Vol. 2016 , 86 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive, Vol. 2016, 86 (2016), 1--118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_7_1","volume-title":"ACM Conference on Computer and Communications Security. ACM, 136--145","author":"Devanbu Premkumar T.","unstructured":"Premkumar T. Devanbu , Michael Gertz , April Kwong , Charles U. Martel , Glen Nuckolls , and Stuart G. Stubblebine . 2001. Flexible authentication of XML documents . In ACM Conference on Computer and Communications Security. ACM, 136--145 . Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, and Stuart G. Stubblebine. 2001. Flexible authentication of XML documents. In ACM Conference on Computer and Communications Security. ACM, 136--145."},{"key":"e_1_3_2_2_8_1","volume-title":"Veritas: Shared Verifiable Databases and Tables in the Cloud. In CIDR","author":"Gehrke Johannes","year":"2019","unstructured":"Johannes Gehrke , Lindsay Allen , Panagiotis Antonopoulos , Arvind Arasu , Joachim Hammer , James Hunter , Raghav Kaushik , Donald Kossmann , Ravi Ramamurthy , Srinath T. V. Setty , Jakub Szymaszek , Alexander van Renen , Jonathan Lee , and Ramarathnam Venkatesan . 2019 . Veritas: Shared Verifiable Databases and Tables in the Cloud. In CIDR 2019, 9th Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 13--16, 2019, Online Proceedings . www.cidrdb.org. Johannes Gehrke, Lindsay Allen, Panagiotis Antonopoulos, Arvind Arasu, Joachim Hammer, James Hunter, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Srinath T. V. Setty, Jakub Szymaszek, Alexander van Renen, Jonathan Lee, and Ramarathnam Venkatesan. 2019. Veritas: Shared Verifiable Databases and Tables in the Cloud. In CIDR 2019, 9th Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 13--16, 2019, Online Proceedings. www.cidrdb.org."},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/download\/sgx-sdk-developer-reference-windows.html","author":"Developer SGX SDK","year":"2020","unstructured":"Intel. [n.d.] a. Intel(R) SGX SDK Developer Reference for Windows . https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/download\/sgx-sdk-developer-reference-windows.html . March 2020 . Intel. [n.d.] a. Intel(R) SGX SDK Developer Reference for Windows. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/download\/sgx-sdk-developer-reference-windows.html. March 2020."},{"key":"e_1_3_2_2_10_1","volume-title":"https:\/\/software.intel.com\/sites\/default\/files\/332680-002.pdf","author":"Software Guard","year":"2015","unstructured":"Intel. [n.d.] b. Intel(R) Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/sites\/default\/files\/332680-002.pdf . June 2015 . Intel. [n.d.] b. Intel(R) Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/sites\/default\/files\/332680-002.pdf. June 2015."},{"key":"e_1_3_2_2_11_1","volume-title":"https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf","author":"Extensions Programming Reference Software Guard","year":"2014","unstructured":"Intel. [n.d.] c. Intel(R) Software Guard Extensions Programming Reference . https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf . 2014 . Intel. [n.d.] c. Intel(R) Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf. 2014."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544853"},{"key":"e_1_3_2_2_13_1","volume-title":"Verena: End-to-End Integrity Protection for Web Applications. In 2016 IEEE Symposium on Security and Privacy (SP). 895--913","author":"Karapanos N.","unstructured":"N. Karapanos , A. Filios , R. A. Popa , and S. Capkun . 2016 . Verena: End-to-End Integrity Protection for Web Applications. In 2016 IEEE Symposium on Security and Privacy (SP). 895--913 . N. Karapanos, A. Filios, R. A. Popa, and S. Capkun. 2016. Verena: End-to-End Integrity Protection for Web Applications. In 2016 IEEE Symposium on Security and Privacy (SP). 895--913."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_3_2_2_15_1","volume-title":"Enabling Strong Database Integrity using Trusted Execution Environments. CoRR","author":"Mast Kai","year":"2018","unstructured":"Kai Mast , Lequn Chen , and Emin G\u00fc n Sirer . 2018. Enabling Strong Database Integrity using Trusted Execution Environments. CoRR , Vol. abs\/ 1801 .01618 ( 2018 ). arxiv: 1801.01618 http:\/\/arxiv.org\/abs\/1801.01618 Kai Mast, Lequn Chen, and Emin G\u00fc n Sirer. 2018. Enabling Strong Database Integrity using Trusted Execution Environments. CoRR, Vol. abs\/1801.01618 (2018). arxiv: 1801.01618 http:\/\/arxiv.org\/abs\/1801.01618"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17)","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . 2017 . ROTE: Rollback Protection for Trusted Execution . In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17) . USENIX Association, USA, 1289--1306. Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17). USENIX Association, USA, 1289--1306."},{"key":"e_1_3_2_2_17_1","volume-title":"HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23--24","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V. Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R. Savagaonkar . 2013. Innovative instructions and software model for isolated execution . In HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23--24 , 2013 . ACM, 10. Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23--24, 2013. ACM, 10."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646752.704751"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS","author":"Mykletun Einar","year":"2004","unstructured":"Einar Mykletun , Maithili Narasimha , and Gene Tsudik . 2004 . Authentication and Integrity in Outsourced Databases . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, San Diego, California, USA. The Internet Society. Einar Mykletun, Maithili Narasimha, and Gene Tsudik. 2004. Authentication and Integrity in Outsourced Databases. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, San Diego, California, USA. The Internet Society."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660373"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/2752939.2752944"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380594"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353402"},{"key":"e_1_3_2_2_26_1","first-page":"251","article-title":"VeritasDB: High Throughput Key-Value Store with Integrity","volume":"2018","author":"Sinha Rohit","year":"2018","unstructured":"Rohit Sinha and Mihai Christodorescu . 2018 . VeritasDB: High Throughput Key-Value Store with Integrity . IACR Cryptol. ePrint Arch. , Vol. 2018 (2018), 251 . Rohit Sinha and Mihai Christodorescu. 2018. VeritasDB: High Throughput Key-Value Store with Integrity. IACR Cryptol. ePrint Arch., Vol. 2018 (2018), 251.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080208"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300083"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559849"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813711"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Qingji Zheng Shouhuai Xu and Giuseppe Ateniese. 2012. Efficient query integrity for outsourced dynamic databases. In CCSW. ACM 71--82.  Qingji Zheng Shouhuai Xu and Giuseppe Ateniese. 2012. Efficient query integrity for outsourced dynamic databases. In CCSW. ACM 71--82.","DOI":"10.1145\/2381913.2381927"},{"key":"e_1_3_2_2_33_1","volume-title":"Joseph E. Gonzalez, and Ion Stoica.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez, and Ion Stoica. 2017 . Opaque : An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. USENIX Association , 283--298. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In NSDI. USENIX Association, 283--298."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:03Z","timestamp":1750195503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":33,"alternative-id":["10.1145\/3448016.3457308","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457308","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}