{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:08:47Z","timestamp":1755839327697,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP190102078"],"award-info":[{"award-number":["DP190102078"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3497761","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"771-783","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Oblivious Permutation via the Waksman Network"],"prefix":"10.1145","author":[{"given":"William","family":"Holland","sequence":"first","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olga","family":"Ohrimenko","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anthony","family":"Wirth","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/800061.808726"},{"key":"e_1_3_2_1_2_1","first-page":"13657","article-title":"An algorithmic framework for differentially private data analysis on trusted processors","volume":"32","author":"Allen Joshua","year":"2019","unstructured":"Joshua Allen , Bolin Ding , Janardhan Kulkarni , Harsha Nori , Olga Ohrimenko , and Sergey Yekhanin . 2019 . An algorithmic framework for differentially private data analysis on trusted processors . Advances in Neural Information Processing Systems (NIPS) , Vol. 32 (2019), 13657 -- 13668 . Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, and Sergey Yekhanin. 2019. An algorithmic framework for differentially private data analysis on trusted processors. Advances in Neural Information Processing Systems (NIPS), Vol. 32 (2019), 13657--13668.","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"volume-title":"Using Amazon S3 storage classes. https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/storage-class-intro.html. [Online","year":"2021","key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2021. Using Amazon S3 storage classes. https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/storage-class-intro.html. [Online ; accessed 24- Jul- 2021 ]. Amazon. 2021. Using Amazon S3 storage classes. https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/storage-class-intro.html. [Online; accessed 24-Jul-2021]."},{"key":"e_1_3_2_1_4_1","volume-title":"Innovative Technology for CPU Based Attestation and Sealing. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP)","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative Technology for CPU Based Attestation and Sealing. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP) , Vol. 13 . 7. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP), Vol. 13. 7."},{"key":"e_1_3_2_1_5_1","volume-title":"Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. In Symposium on Simplicity in Algorithms. 8--14","author":"Asharov Gilad","year":"2020","unstructured":"Gilad Asharov , TH Hubert Chan , Kartik Nayak , Rafael Pass , Ling Ren , and Elaine Shi . 2020 a . Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. In Symposium on Simplicity in Algorithms. 8--14 . Gilad Asharov, TH Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. 2020 a. Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. In Symposium on Simplicity in Algorithms. 8--14."},{"key":"e_1_3_2_1_6_1","volume-title":"OptORAMa: Optimal Oblivious RAM. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt). 403--432","author":"Asharov Gilad","year":"2020","unstructured":"Gilad Asharov , Ilan Komargodski , Wei-Kai Lin , Kartik Nayak , Enoch Peserico , and Elaine Shi . 2020 b . OptORAMa: Optimal Oblivious RAM. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt). 403--432 . Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, and Elaine Shi. 2020 b. OptORAMa: Optimal Oblivious RAM. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt). 403--432."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626402000999"},{"key":"e_1_3_2_1_9_1","first-page":"207","article-title":"Introduction to modern cryptography","volume":"207","author":"Bellare Mihir","year":"2005","unstructured":"Mihir Bellare and Phillip Rogaway . 2005 . Introduction to modern cryptography . Ucsd Cse , Vol. 207 (2005), 207 . Mihir Bellare and Phillip Rogaway. 2005. Introduction to modern cryptography. Ucsd Cse, Vol. 207 (2005), 207.","journal-title":"Ucsd Cse"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422481"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium. 781--796","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 . Succinct non-interactive zero knowledge for a von Neumann architecture . In USENIX Security Symposium. 781--796 . Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security Symposium. 781--796."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813649"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_14_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT).","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT). Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium. 857--874","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal hardware extensions for strong software isolation . In USENIX Security Symposium. 857--874 . Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In USENIX Security Symposium. 857--874."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746629"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Badih Ghazi Noah Golowich Ravi Kumar Rasmus Pagh and Ameya Velingker. 2021. On the Power of Multiple Anonymous Messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt). 463--488.  Badih Ghazi Noah Golowich Ravi Kumar Rasmus Pagh and Ameya Velingker. 2021. On the Power of Multiple Anonymous Messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt). 463--488.","DOI":"10.1007\/978-3-030-77883-5_16"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591830"},{"volume-title":"International Colloquium on Automata, Languages, and Programming (ICALP)","author":"Goodrich Michael T","key":"e_1_3_2_1_21_1","unstructured":"Michael T Goodrich and Michael Mitzenmacher . 2011. Privacy-preserving access of outsourced data via oblivious RAM simulation . In International Colloquium on Automata, Languages, and Programming (ICALP) . Springer , 576--587. Michael T Goodrich and Michael Mitzenmacher. 2011. Privacy-preserving access of outsourced data via oblivious RAM simulation. In International Colloquium on Automata, Languages, and Programming (ICALP). Springer, 576--587."},{"key":"e_1_3_2_1_22_1","volume-title":"Practical Oblivious Storage. In ACM Conference on Data and Application Security and Privacy (CODASPY). 13--24","author":"Goodrich Michael T.","year":"2012","unstructured":"Michael T. Goodrich , Michael Mitzenmacher , Olga Ohrimenko , and Roberto Tamassia . 2012 a. Practical Oblivious Storage. In ACM Conference on Data and Application Security and Privacy (CODASPY). 13--24 . Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, and Roberto Tamassia. 2012a. Practical Oblivious Storage. In ACM Conference on Data and Application Security and Privacy (CODASPY). 13--24."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.14"},{"volume-title":"Intel Xeon Processor Scalable Family Technical Overview. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-xeon-processor-scalable-family-technical-overview.html. [Online","year":"2021","key":"e_1_3_2_1_24_1","unstructured":"Intel. [n.d.]. Intel Xeon Processor Scalable Family Technical Overview. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-xeon-processor-scalable-family-technical-overview.html. [Online ; accessed 24- Jul- 2021 ]. Intel. [n.d.]. Intel Xeon Processor Scalable Family Technical Overview. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-xeon-processor-scalable-family-technical-overview.html. [Online; accessed 24-Jul-2021]."},{"key":"e_1_3_2_1_25_1","volume-title":"The Network and Distributed System Security Symposium (NDSS)","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access pattern disclosure on searchable encryption: ramification, attack and mitigation . In The Network and Distributed System Security Symposium (NDSS) , Vol. 20 . Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In The Network and Distributed System Security Symposium (NDSS), Vol. 20."},{"key":"e_1_3_2_1_26_1","unstructured":"Pratheek Karnati. 2018. Data-in-use protection on IBM Cloud using Intel SGX . https:\/\/www.ibm.com\/cloud\/blog\/data-use-protection-ibm-cloud-using-intel-sgx.  Pratheek Karnati. 2018. Data-in-use protection on IBM Cloud using Intel SGX . https:\/\/www.ibm.com\/cloud\/blog\/data-use-protection-ibm-cloud-using-intel-sgx."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.13"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.148"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"volume-title":"Azure confidential computing. https:\/\/azure.microsoft.com\/en-au\/solutions\/confidential-compute. [Online","year":"2021","key":"e_1_3_2_1_30_1","unstructured":"Microsoft. [n.d.]. Azure confidential computing. https:\/\/azure.microsoft.com\/en-au\/solutions\/confidential-compute. [Online ; accessed 24- Jul- 2021 ]. Microsoft. [n.d.]. Azure confidential computing. https:\/\/azure.microsoft.com\/en-au\/solutions\/confidential-compute. [Online; accessed 24-Jul-2021]."},{"key":"e_1_3_2_1_31_1","volume-title":"CacheZoom: How SGX Amplifies the Power of Cache Attacks. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 69--90","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi , Gorka Irazoqui , and Thomas Eisenbarth . 2017 . CacheZoom: How SGX Amplifies the Power of Cache Attacks. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 69--90 . Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies the Power of Cache Attacks. In International Conference on Cryptographic Hardware and Embedded Systems (CHES). 69--90."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675216"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Olga Ohrimenko Michael T Goodrich Roberto Tamassia and Eli Upfal. 2014. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata Languages and Programming (ICALP). 556--567.  Olga Ohrimenko Michael T Goodrich Roberto Tamassia and Eli Upfal. 2014. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata Languages and Programming (ICALP). 556--567.","DOI":"10.1007\/978-3-662-43951-7_47"},{"key":"e_1_3_2_1_34_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security Symposium . 619--636","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security Symposium . 619--636 . Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security Symposium . 619--636."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00087"},{"key":"e_1_3_2_1_36_1","unstructured":"Sarvar Patel Giuseppe Persiano and Kevin Yeo. 2018a. CacheShuffle: A Family of Oblivious Shuffles. In International Colloquium on Automata Languages and Programming (ICALP).  Sarvar Patel Giuseppe Persiano and Kevin Yeo. 2018a. CacheShuffle: A Family of Oblivious Shuffles. In International Colloquium on Automata Languages and Programming (ICALP)."},{"key":"e_1_3_2_1_37_1","volume-title":"libsnark: a Clibrary for zkSNARK proofs. https:\/\/github.com\/scipr-lab\/libsnark. [Online","author":"SCIPR","year":"2021","unstructured":"SCIPR Lab project.[n.d.]. libsnark: a Clibrary for zkSNARK proofs. https:\/\/github.com\/scipr-lab\/libsnark. [Online ; accessed 24- Jul- 2021 ]. SCIPR Lab project.[n.d.]. libsnark: a Clibrary for zkSNARK proofs. https:\/\/github.com\/scipr-lab\/libsnark. [Online; accessed 24-Jul-2021]."},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security Symposium. 415--430","author":"Ren Ling","year":"2015","unstructured":"Ling Ren , Christopher Fletcher , Albert Kwon , Emil Stefanov , Elaine Shi , Marten Van Dijk , and Srinivas Devadas . 2015 . Constants Count: Practical Improvements to Oblivious RAM . In USENIX Security Symposium. 415--430 . Ling Ren, Christopher Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM. In USENIX Security Symposium. 415--430."},{"volume-title":"The Network and Distributed System Security Symposium (NDSS).","author":"Sasy Sajin","key":"e_1_3_2_1_39_1","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher W. Fletcher . 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX . In The Network and Distributed System Security Symposium (NDSS). Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX. In The Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00037"},{"key":"e_1_3_2_1_41_1","volume-title":"The Network and Distributed System Security Symposium (NDSS).","author":"Stefanov Emil","year":"2011","unstructured":"Emil Stefanov , Elaine Shi , and Dawn Song . 2011 . Towards practical oblivious RAM . In The Network and Distributed System Security Symposium (NDSS). Emil Stefanov, Elaine Shi, and Dawn Song. 2011. Towards practical oblivious RAM. In The Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/321439.321449"},{"key":"e_1_3_2_1_44_1","volume-title":"Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P). 640--656","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . 2015 . Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P). 640--656 . Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In IEEE Symposium on Security and Privacy (S&P). 640--656."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.21"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497761","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3497761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:29Z","timestamp":1750193309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":45,"alternative-id":["10.1145\/3488932.3497761","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3497761","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}