{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:34:14Z","timestamp":1773704054086,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484552","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2243-2261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions"],"prefix":"10.1145","author":[{"given":"Evangelia Anna","family":"Markatou","sequence":"first","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"given":"Francesca","family":"Falzon","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Roberto","family":"Tamassia","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"given":"William","family":"Schor","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Healthcare Cost and Utilization Project (HCUP). Nationwide Inpatient Sample (NIS) datasets NIS 2008 and","author":"Agency for Healthcare Research and Quality. 2008, 2009.","year":"2009","unstructured":"Agency for Healthcare Research and Quality. 2008, 2009. Healthcare Cost and Utilization Project (HCUP). Nationwide Inpatient Sample (NIS) datasets NIS 2008 and 2009, https:\/\/www.hcup-us.ahrq.gov\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/65.3.625"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/1936861"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"David Cash Stanislaw Jarecki Charanjit Jutla Hugo Krawczyk Marcel-Catalin Ro?u and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In Advances in Cryptology (CRYPTO).","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings, Part II (LNCS","volume":"510","author":"Cash David","year":"2021","unstructured":"David Cash, Ruth Ng, and Adam Rivkin. 2021. Improved Structured Encryption for SQL Databases via Hybrid Indexing. In Applied Cryptography and Network Security, Proceedings, Part II (LNCS, Vol. 12727). Springer, 480--510."},{"key":"e_1_3_2_1_7_1","unstructured":"Edwin Chan. 2020. PyDistinct. https:\/\/github.com\/chanedwin\/pydistinct\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1992.10475194"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882911"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167971"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056714"},{"key":"e_1_3_2_1_12_1","volume-title":"Rich Queries on Encrypted Data: Beyond Exact Matches. In 20th European Symposium on Research in Computer Security 2015 (ESORICS","author":"Faber Sky","year":"2015","unstructured":"Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In 20th European Symposium on Research in Computer Security 2015 (ESORICS 2015)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417275"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539794266171"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Ph.D. Dissertation. Stanford CA USA. Advisor(s) Boneh Dan.","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_17_1","volume-title":"Pancake: Frequency Smoothing for Encrypted Data Stores. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Grubbs Paul","year":"2020","unstructured":"Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharit\u00e9, Lloyd Brown, Lucy Li, Rachit Agarwal, and Thomas Ristenpart. 2020. Pancake: Frequency Smoothing for Encrypted Data Stores. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. ACM Conf. on Computer and Communications Security (CCS). ACM, 315--331","author":"Grubbs Paul","unstructured":"Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In Proc. ACM Conf. on Computer and Communications Security (CCS). ACM, 315--331."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. IEEE Symp. on Security and Privacy (S&P).","author":"Grubbs Paul","unstructured":"Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2019. Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. In Proc. IEEE Symp. on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 21th International Conference on Very Large Data Bases (VLDB '95)","author":"Haas P.","unstructured":"P. Haas, J. Naughton, S. Seshadri, and L. Stokes. 1995. Sampling-Based Estimation of the Number of Distinct Values of an Attribute. In Proceedings of the 21th International Conference on Very Large Data Bases (VLDB '95). San Francisco, CA, USA, 311--322."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2649-2"},{"key":"e_1_3_2_1_23_1","volume-title":"Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5--8, 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In Advances in Cryptology (ASIACRYPT).","DOI":"10.1007\/978-3-030-03326-2_6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00044"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_3_2_1_30_1","unstructured":"Feifei Li Dihan Cheng Marios Hadjieleftheriou George Kollios and Shang-Hua Teng. 2005. California Road Network Dataset. Downloaded from http:\/\/www.cs.utah.edu\/~lifeifei\/SpatialDataset.htm."},{"key":"e_1_3_2_1_31_1","volume-title":"Advances in Spatial and Temporal Databases","author":"Li Feifei","unstructured":"Feifei Li, Dihan Cheng, Marios Hadjieleftheriou, George Kollios, and Shang-Hua Teng. 2005. On Trip Planning Queries in Spatial Databases. In Advances in Spatial and Temporal Databases. Springer, 273--290."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_2"},{"key":"e_1_3_2_1_33_1","volume-title":"ISC","author":"Markatou Evangelia Anna","year":"2019","unstructured":"Evangelia Anna Markatou and Roberto Tamassia. 2019. Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. In Information Security - 22nd International Conference, ISC 2019."},{"key":"e_1_3_2_1_34_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Oya Simon","year":"2021","unstructured":"Simon Oya and Florian Kerschbaum. 2021. Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Symp. on Operating Systems Design and Implementation (OSDI). 587-- 602","author":"Papadimitriou Antonis","year":"2016","unstructured":"Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed. In USENIX Symp. on Operating Systems Design and Implementation (OSDI). 587-- 602."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354213"},{"key":"e_1_3_2_1_37_1","first-page":"11","article-title":"Arx","volume":"12","author":"Poddar Rishabh","year":"2019","unstructured":"Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. 2019. Arx: An Encrypted Database Using Semantically Secure Encryption. 12, 11 (July 2019), 1664--1678.","journal-title":"An Encrypted Database Using Semantically Secure Encryption."},{"key":"e_1_3_2_1_38_1","volume-title":"Practical Volume-Based Attacks on Encrypted Databases. In IEEE European Symp. on Security and Privacy (EuroS&P). 354--369","author":"Poddar Rishabh","year":"2020","unstructured":"Rishabh Poddar, Stephanie Wang, Jianan Lu, and Raluca Ada Popa. 2020. Practical Volume-Based Attacks on Encrypted Databases. In IEEE European Symp. on Security and Privacy (EuroS&P). 354--369."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1949.tb00023.x"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_42_1","first-page":"97","article-title":"On estimation of the size of the dictionary of a long text on the basis of a sample","volume":"19","author":"Shlosser A.","year":"1981","unstructured":"A. Shlosser. 1981. On estimation of the size of the dictionary of a long text on the basis of a sample. Engineering Cybernetics 19 (1981), 97--102.","journal-title":"Engineering Cybernetics"},{"key":"e_1_3_2_1_43_1","unstructured":"Malte Spitz. 2011. CRAWDAD dataset spitz\/cellular (v. 2011-05-04). Downloaded from https:\/\/crawdad.org\/spitz\/cellular\/20110504."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2408351"},{"key":"e_1_3_2_1_45_1","first-page":"2157","article-title":"Estimating the Unseen: Improved Estimators for Entropy and other Properties","volume":"26","author":"Valiant Paul","year":"2013","unstructured":"Paul Valiant and Gregory Valiant. 2013. Estimating the Unseen: Improved Estimators for Entropy and other Properties. In Advances in Neural Information Processing Systems, Vol. 26. 2157--2165.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-0208(08)73835-0"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0686-2"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590305"},{"key":"e_1_3_2_1_49_1","volume-title":"Conf. on Innovative Data Systems Research (CIDR).","author":"Zhao Zheguang","year":"2021","unstructured":"Zheguang Zhao, Seny Kamara, Tarik Moataz, and Stan Zdonik. 2021. Encrypted Databases: From Theory to Systems. In Conf. on Innovative Data Systems Research (CIDR)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:51Z","timestamp":1763499231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":49,"alternative-id":["10.1145\/3460120.3484552","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484552","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}