{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:34:15Z","timestamp":1773704055779,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001961","name":"AXA Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001961","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032005, 61972094, 61825203, U1736203, 61732021"],"award-info":[{"award-number":["62032005, 61972094, 61825203, U1736203, 61732021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Foundation of Fujian Provincial Science and Technology Agency","award":["2020J02016"],"award-info":[{"award-number":["2020J02016"]}]},{"name":"Young talent promotion project of Fujian Science and Technology Association"},{"name":"Major Program of Guangdong Basic and Applied Research Project","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"name":"National Key Research and Development Plan of China","award":["2020YFB1005600"],"award-info":[{"award-number":["2020YFB1005600"]}]},{"name":"Guangdong Provincial Science and Technology Project","award":["2017B010111005"],"award-info":[{"award-number":["2017B010111005"]}]},{"name":"Ripple University Blockchain Research Initiative"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484540","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2307-2320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset"],"prefix":"10.1145","author":[{"given":"Jianting","family":"Ning","sequence":"first","affiliation":[{"name":"Fujian Normal University &amp; Singapore Management University, Fuzhou, China"}]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Geong Sen","family":"Poh","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Jiaming","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Oregon, Oregon, OR, USA"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"University of Oregon, Oregon, OR, USA"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations. IACR Cryptology ePrint Archive (and STOC","author":"Asharov Gilad","year":"2016","unstructured":"Gilad Asharov, Moni Naor, Gil Segev, and Ido Shahaf. 2016. Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations. IACR Cryptology ePrint Archive (and STOC 2016), Vol. 2016\/251 (2016), 1--34."},{"key":"e_1_3_2_2_2_1","volume-title":"Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS","author":"Blackstone Laura","year":"2020","unstructured":"Laura Blackstone, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society."},{"key":"e_1_3_2_2_3_1","volume-title":"ACM Comput. Surv.","volume":"47","author":"B\u00f6sch Christoph","year":"2014","unstructured":"Christoph B\u00f6sch, Pieter Hartel, Willem Jonker, and Andreas Peter. 2014. A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv., Vol. 47, 2, Article 18 (2014), 51 pages."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_2_5_1","volume-title":"Leakage-Abuse Attacks Against Searchable Encryption. In ACM CCS","author":"Cash David","year":"2015","unstructured":"David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In ACM CCS 2015, Indrajit Ray, Ninghui Li, and Christopher Kruegel (Eds.). ACM, 668--679."},{"key":"e_1_3_2_2_6_1","volume-title":"Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation. In NDSS","volume":"2014","author":"Cash David","year":"2014","unstructured":"David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2014. Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation. In NDSS 2014, Vol. 2014. Internet Society."},{"key":"e_1_3_2_2_7_1","volume-title":"Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO 2013 (LNCS","volume":"373","author":"Cash David","year":"2013","unstructured":"David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO 2013 (LNCS, Vol. 8042), Ran Canetti and Juan A. Garay (Eds.). Springer, 353--373."},{"key":"e_1_3_2_2_8_1","volume-title":"The Locality of Searchable Symmetric Encryption. In EUROCRYPT 2014 (LNCS","volume":"368","author":"Cash David","year":"2014","unstructured":"David Cash and Stefano Tessaro. 2014. The Locality of Searchable Symmetric Encryption. In EUROCRYPT 2014 (LNCS, Vol. 8441), Phong Q. Nguyen and Elisabeth Oswald (Eds.). Springer, 351--368."},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 1038--1055","author":"Chamani Javad Ghareh","year":"2018","unstructured":"Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 1038--1055."},{"key":"e_1_3_2_2_10_1","volume-title":"Privacy Preserving Keyword Searches on Remote Encrypted Data. In ACNS 2005 (LNCS","volume":"455","author":"Chang Yan-Cheng","year":"2005","unstructured":"Yan-Cheng Chang and Michael Mitzenmacher. 2005. Privacy Preserving Keyword Searches on Remote Encrypted Data. In ACNS 2005 (LNCS, Vol. 3531), John Ioannidis, Angelos D. Keromytis, and Moti Yung (Eds.). Springer, 442--455."},{"key":"e_1_3_2_2_11_1","volume-title":"Structured Encryption and Controlled Disclosure. In ASIACRYPT 2010 (LNCS","volume":"594","author":"Chase Melissa","year":"2010","unstructured":"Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. In ASIACRYPT 2010 (LNCS, Vol. 6477), Masayuki Abe (Ed.). Springer, 577--594."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_2_13_1","unstructured":"Enron email dataset. 2019. https:\/\/www.cs.cmu.edu\/ .\/enron\/. Accessed: 2019--11--23."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417275"},{"key":"e_1_3_2_2_15_1","volume-title":"Bellovin","author":"Fisch Ben A.","year":"2015","unstructured":"Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, and Steven M. Bellovin. 2015. Malicious-Client Security in Blind Seer: A Scalable Private DBMS. In IEEE S & P 2015. IEEE Computer Society, 395--410."},{"key":"e_1_3_2_2_16_1","unstructured":"Eu-Jin Goh. 2003. Secure Indexes. IACR Cryptology ePrint Archive Report 2003\/216. http:\/\/eprint.iacr.org\/2003\/216\/."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 315--331","author":"Grubbs Paul","unstructured":"Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 315--331."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660326"},{"key":"e_1_3_2_2_21_1","volume-title":"Attack and Mitigation. In NDSS","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In NDSS 2012. The Internet Society."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516730"},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings, Part II (Lecture Notes in Computer Science","volume":"213","author":"Kamara Seny","year":"2019","unstructured":"Seny Kamara and Tarik Moataz. 2019. Computationally Volume-Hiding Structured Encryption. In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part II (Lecture Notes in Computer Science, Vol. 11477), Yuval Ishai and Vincent Rijmen (Eds.). Springer, 183--213."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings, Part I (Lecture Notes in Computer Science","volume":"370","author":"Kamara Seny","year":"2018","unstructured":"Seny Kamara, Tarik Moataz, and Olga Ohrimenko. 2018. Structured Encryption and Leakage Suppression. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Proceedings, Part I (Lecture Notes in Computer Science, Vol. 10991), Hovav Shacham and Alexandra Boldyreva (Eds.). Springer, 339--370."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_2_26_1","volume-title":"Generic Attacks on Secure Outsourced Databases. In ACM CCS","author":"Kellaris Georgios","year":"2016","unstructured":"Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2016. Generic Attacks on Secure Outsourced Databases. In ACM CCS 2016, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM, 1329--1340."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00015"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_2_29_1","volume-title":"Garbled Searchable Symmetric Encryption. In FC 2014 (LNCS","volume":"251","author":"Kurosawa Kaoru","year":"2014","unstructured":"Kaoru Kurosawa. 2014. Garbled Searchable Symmetric Encryption. In FC 2014 (LNCS, Vol. 8437), Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer, 234--251."},{"key":"e_1_3_2_2_30_1","volume-title":"UC-Secure Searchable Symmetric Encryption. In FC'12 (LNCS","volume":"298","author":"Kurosawa Kaoru","year":"2012","unstructured":"Kaoru Kurosawa and Yasuhiro Ohtaki. 2012. UC-Secure Searchable Symmetric Encryption. In FC'12 (LNCS, Vol. 7397), Angelos D. Keromytis (Ed.). Springer, 285--298."},{"key":"e_1_3_2_2_31_1","volume-title":"Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. In 2018 IEEE Symposium on Security and Privacy, S&P 2018, Proceedings. IEEE Computer Society, 297--314","author":"Lacharit\u00e9 Marie-Sarah","unstructured":"Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. In 2018 IEEE Symposium on Security and Privacy, S&P 2018, Proceedings. IEEE Computer Society, 297--314."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243753"},{"key":"e_1_3_2_2_33_1","volume-title":"Gunter","author":"Naveed Muhammad","year":"2014","unstructured":"Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage. In IEEE S&P 2014. IEEE Computer Society, 639--654."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3015997"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00030"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/00330330610681286"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978401"},{"key":"e_1_3_2_2_40_1","volume-title":"Practical Techniques for Searches on Encrypted Data","author":"Song Dawn Xiaodong","unstructured":"Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In IEEE S&P '00. IEEE Computer Society, 44."},{"key":"e_1_3_2_2_41_1","volume-title":"Practical Dynamic Searchable Encryption with Small Leakage. In NDSS 2014","author":"Stefanov Emil","year":"2014","unstructured":"Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In NDSS 2014. The Internet Society. http:\/\/www.internetsociety.org\/events\/ndss-symposium-2014"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.6778"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.245"},{"key":"e_1_3_2_2_44_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/zhang"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:52:21Z","timestamp":1763499141000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":44,"alternative-id":["10.1145\/3460120.3484540","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484540","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}