{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:30Z","timestamp":1750220250631,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Japanese Society for the Promotion of Science","award":["JP21H03441, JP21H03395, JP18H05289, JP18K11293"],"award-info":[{"award-number":["JP21H03441, JP21H03395, JP18H05289, JP18K11293"]}]},{"DOI":"10.13039\/501100001700","name":"Ministry of Education, Culture, Sports, Science and Technology","doi-asserted-by":"publisher","award":["Leading Initiative for Excellent Young Researchers"],"award-info":[{"award-number":["Leading Initiative for Excellent Young Researchers"]}],"id":[{"id":"10.13039\/501100001700","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency","doi-asserted-by":"publisher","award":["CREST JPMJCR19F6"],"award-info":[{"award-number":["CREST JPMJCR19F6"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511521","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"312-323","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage"],"prefix":"10.1145","author":[{"given":"Yohei","family":"Watanabe","sequence":"first","affiliation":[{"name":"The University of Electro-Communications &amp; NICT, Tokyo, Japan"}]},{"given":"Kazuma","family":"Ohara","sequence":"additional","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Mitsugu","family":"Iwamoto","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications, Tokyo, Japan"}]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications &amp; AIST, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.2478\/popets-2019-0014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1145\/2897518.2897562"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1007\/978-3-319-96884-1_14"},{"key":"e_1_3_2_2_4_1","volume-title":"Revisiting Leakage Abuse Attacks. In Network and Distributed System Security Symposium, NDSS 2020 .% The Internet Society.","author":"Blackstore Laura","year":"2020","unstructured":"Laura Blackstore , Seny Kamara , and Tarik Moataz . 2020 . Revisiting Leakage Abuse Attacks. In Network and Distributed System Security Symposium, NDSS 2020 .% The Internet Society. Laura Blackstore, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In Network and Distributed System Security Symposium, NDSS 2020 .% The Internet Society."},{"key":"e_1_3_2_2_5_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security, CCS 2016 . ACM, 1143--1154","author":"Bost Raphael","year":"2016","unstructured":"Raphael Bost . 2016 . \u03a3ovarphiovarsigma$: Forward Secure Searchable Encryption . In ACM SIGSAC Conference on Computer and Communications Security, CCS 2016 . ACM, 1143--1154 . Raphael Bost. 2016. \u03a3ovarphiovarsigma$: Forward Secure Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2016 . ACM, 1143--1154."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_2_8_1","volume-title":"Leakage-Abuse Attacks Against Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 . ACM, 668--679","author":"Cash David","year":"2015","unstructured":"David Cash , Paul Grubbs , Jason Perry , and Thomas Ristenpart . 2015 . Leakage-Abuse Attacks Against Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 . ACM, 668--679 . David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 . ACM, 668--679."},{"key":"e_1_3_2_2_9_1","volume-title":"Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. In Network and Distributed System Security Symposium, NDSS 2014 .% The Internet Society.","author":"Cash David","year":"2014","unstructured":"David Cash , Joseph Jaeger , Stanislaw Jarecki , Charanjit Jutla , Hugo Krawczyk , Marcel-Cvatvalin Rocsu , and Michael Steiner . 2014 . Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. In Network and Distributed System Security Symposium, NDSS 2014 .% The Internet Society. David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cvatvalin Rocsu, and Michael Steiner. 2014. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. In Network and Distributed System Security Symposium, NDSS 2014 .% The Internet Society."},{"volume-title":"Advances in Cryptology -- EUROCRYPT 2014","author":"Cash David","unstructured":"David Cash and Stefano Tessaro . 2014. The Locality of Searchable Symmetric Encryption . In Advances in Cryptology -- EUROCRYPT 2014 . Springer , 351--368. David Cash and Stefano Tessaro. 2014. The Locality of Searchable Symmetric Encryption. In Advances in Cryptology -- EUROCRYPT 2014 . Springer, 351--368.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","volume-title":"New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 . ACM, 1038--1055","author":"Chamani Javad Ghareh","year":"2018","unstructured":"Javad Ghareh Chamani , Dimitrios Papadopoulos , Charalampos Papamanthou , and Rasool Jalili . 2018 . New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 . ACM, 1038--1055 . Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New Constructions for Forward and Backward Private Symmetric Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 . ACM, 1038--1055."},{"key":"e_1_3_2_2_12_1","volume-title":"Bestie: Very Practical Searchable Encryption with Forward and Backward Security. In Computer Security -- ESORICS","author":"Chen Tianyang","year":"2021","unstructured":"Tianyang Chen , Peng Xu , Wei Wang , Yubo Zheng , Willy Susilo , and Hai Jin . 2021 . Bestie: Very Practical Searchable Encryption with Forward and Backward Security. In Computer Security -- ESORICS 2021. Springer , 3--23. Tianyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin. 2021. Bestie: Very Practical Searchable Encryption with Forward and Backward Security. In Computer Security -- ESORICS 2021. Springer, 3--23."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1145\/1180405.1180417"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.5555\/2590701.2590705"},{"volume-title":"Advances in Cryptology -- CRYPTO 2018","author":"Demertzis Ioannis","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , and Charalampos Papamanthou . 2018. Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency . In Advances in Cryptology -- CRYPTO 2018 . Springer , 371--406. Ioannis Demertzis, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2018. Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency. In Advances in Cryptology -- CRYPTO 2018 . Springer, 371--406.","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","volume-title":"Fast Searchable Encryption With Tunable Locality. In ACM International Conference on Management of Data, SIGMOD","author":"Demertzis Ioannis","year":"2017","unstructured":"Ioannis Demertzis and Charalampos Papamanthou . 2017 . Fast Searchable Encryption With Tunable Locality. In ACM International Conference on Management of Data, SIGMOD 2017. ACM, 1053--1067. Ioannis Demertzis and Charalampos Papamanthou. 2017. Fast Searchable Encryption With Tunable Locality. In ACM International Conference on Management of Data, SIGMOD 2017. ACM, 1053--1067."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1515\/popets-2018-0002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1007\/978-3-319-29485-8_5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_2_20_1","volume-title":"Searchable Encryption with Secure and Efficient Updates. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2014 . ACM, 310--320","author":"Hahn Florian","year":"2014","unstructured":"Florian Hahn and Florian Kerschbaum . 2014 . Searchable Encryption with Secure and Efficient Updates. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2014 . ACM, 310--320 . Florian Hahn and Florian Kerschbaum. 2014. Searchable Encryption with Secure and Efficient Updates. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2014 . ACM, 310--320."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1007\/978-3-319-29485-8_6"},{"key":"e_1_3_2_2_22_1","volume-title":"Network and Distributed System Security Symposium, NDSS 2012 .% The Internet Society.","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access pattern disclosure on searchable encryption: Ramification, attack and mitigation . In Network and Distributed System Security Symposium, NDSS 2012 .% The Internet Society. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Network and Distributed System Security Symposium, NDSS 2012 .% The Internet Society."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1007\/978-3-030-17656-3_7"},{"volume-title":"Advances in Cryptology -- CRYPTO 2018","author":"Kamara Seny","unstructured":"Seny Kamara , Tarik Moataz , and Olya Ohrimenko . 2018. Structured Encryption and Leakage Suppression . In Advances in Cryptology -- CRYPTO 2018 . Springer , 339--370. Seny Kamara, Tarik Moataz, and Olya Ohrimenko. 2018. Structured Encryption and Leakage Suppression. In Advances in Cryptology -- CRYPTO 2018 . Springer, 339--370.","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","volume-title":"FC 2013. Springer, 258--274","author":"Kamara Seny","year":"2013","unstructured":"Seny Kamara and Charalampos Papamanthou . 2013 . Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography and Data Security , FC 2013. Springer, 258--274 . Seny Kamara and Charalampos Papamanthou. 2013. Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography and Data Security, FC 2013. Springer, 258--274."},{"key":"e_1_3_2_2_26_1","volume-title":"Dynamic Searchable Symmetric Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2012 . ACM, 965--976","author":"Kamara Seny","year":"2012","unstructured":"Seny Kamara , Charalampos Papamanthou , and Tom Roeder . 2012 . Dynamic Searchable Symmetric Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2012 . ACM, 965--976 . Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic Searchable Symmetric Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2012 . ACM, 965--976."},{"key":"e_1_3_2_2_27_1","volume-title":"Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 . ACM, 1449--1463","author":"Kim Sung Kim","year":"2017","unstructured":"Sung Kim Kim , Minkyu Kim , Dongsoo Lee , Je Hong Park , and Woo-Hwan Kim . 2017 . Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 . ACM, 1449--1463 . if0 Sung Kim Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. 2017. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 . ACM, 1449--1463. if0"},{"key":"e_1_3_2_2_28_1","volume-title":"FC 2012. Springer, 285--298","author":"Kurosawa Kaoru","year":"2012","unstructured":"Kaoru Kurosawa and Yasuhiro Ohtaki . 2012 . UC-Secure Searchable Symmetric Encryption. In Financial Cryptography and Data Security , FC 2012. Springer, 285--298 . Kaoru Kurosawa and Yasuhiro Ohtaki. 2012. UC-Secure Searchable Symmetric Encryption. In Financial Cryptography and Data Security, FC 2012. Springer, 285--298."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1007\/978-3-319-02937-5_17"},{"key":"e_1_3_2_2_30_1","volume-title":"IWSEC","author":"Kurosawa Kaoru","year":"2016","unstructured":"Kaoru Kurosawa , Keisuke Sasaki , Kiyohiko Ohta , and Kazuki Yoneyama . 2016 . UC-Secure Dynamic Searchable Symmetric Encryption Scheme. In Advances in Information and Computer Security , IWSEC 2016. Springer, 73--90. fi Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama. 2016. UC-Secure Dynamic Searchable Symmetric Encryption Scheme. In Advances in Information and Computer Security, IWSEC 2016. Springer, 73--90. fi"},{"key":"e_1_3_2_2_31_1","volume-title":"Result Pattern Hiding Searchable Encryption for Conjunctive Queries. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 . ACM, 745--762","author":"Lai Shangqi","year":"2018","unstructured":"Shangqi Lai , Sikhar Patranabis , Amin Sakzad , Joseph K. Liu , Debdeep Mukhopadhyay , Ron Steinfeld , Shi-Feng Sun , Dongxi Liu , and Cong Zuo . 2018 . Result Pattern Hiding Searchable Encryption for Conjunctive Queries. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 . ACM, 745--762 . Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, and Cong Zuo. 2018. Result Pattern Hiding Searchable Encryption for Conjunctive Queries. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 . ACM, 745--762."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1016\/j.ins.2013.11.021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.14722\/ndss.2017.23394"},{"key":"e_1_3_2_2_34_1","volume-title":"IEEE Symposium on Security and Privacy, S&P","author":"Naveed M.","year":"2014","unstructured":"M. Naveed , M. Prabhakaran , and C.A. Gunter . 2014. Dynamic Searchable Encryption via Blind Storage . In IEEE Symposium on Security and Privacy, S&P 2014 . 639--654. M. Naveed, M. Prabhakaran, and C.A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage. In IEEE Symposium on Security and Privacy, S&P 2014. 639--654."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"e_1_3_2_2_36_1","volume-title":"Efficient Computation on Oblivious RAMs. In ACM Symposium on Theory of Computing, STOC 1990 . ACM, 514--523","author":"Ostrovsky Rafail","year":"1990","unstructured":"Rafail Ostrovsky . 1990 . Efficient Computation on Oblivious RAMs. In ACM Symposium on Theory of Computing, STOC 1990 . ACM, 514--523 . Rafail Ostrovsky. 1990. Efficient Computation on Oblivious RAMs. In ACM Symposium on Theory of Computing, STOC 1990 . ACM, 514--523."},{"key":"e_1_3_2_2_37_1","volume-title":"Forward and Backward Private Conjunctive Searchable Symmetric Encryption. In Network and Distributed System Security Symposium, NDSS 2021 .% The Internet Society.","author":"Patranabis Sikhar","year":"2021","unstructured":"Sikhar Patranabis and Debdeep Mukhopadhyay . 2021 . Forward and Backward Private Conjunctive Searchable Symmetric Encryption. In Network and Distributed System Security Symposium, NDSS 2021 .% The Internet Society. Sikhar Patranabis and Debdeep Mukhopadhyay. 2021. Forward and Backward Private Conjunctive Searchable Symmetric Encryption. In Network and Distributed System Security Symposium, NDSS 2021 .% The Internet Society."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_38_1","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_2_39_1","volume-title":"Efficiently Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"Pouliot David","year":"2016","unstructured":"David Pouliot and Charles V. Wright . 2016. The Shadow Nemesis: Inference Attacks on Efficiently Deployable , Efficiently Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2016 . ACM, 1341--1352. David Pouliot and Charles V. Wright. 2016. The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2016. ACM, 1341--1352."},{"key":"e_1_3_2_2_40_1","volume-title":"Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. In ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW","author":"Rizomiliotis Panagiotis","year":"2019","unstructured":"Panagiotis Rizomiliotis and Stefanos Gritzalis . 2019 . Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. In ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW 2019. ACM, 141--152. Panagiotis Rizomiliotis and Stefanos Gritzalis. 2019. Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. In ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW 2019. ACM, 141--152."},{"key":"e_1_3_2_2_41_1","volume-title":"Validity of the Single Processor Approach to Achieving Large Scale Computing Capabilities. AFIPS'67 (Spring)","author":"Amdahl Gene M.","year":"1967","unstructured":"Gene M. Amdahl . 1967. Validity of the Single Processor Approach to Achieving Large Scale Computing Capabilities. AFIPS'67 (Spring) ( 1967 ), ACM , 483--485. if0 Gene M. Amdahl. 1967. Validity of the Single Processor Approach to Achieving Large Scale Computing Capabilities. AFIPS'67 (Spring) (1967), ACM, 483--485. if0"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_42_1","DOI":"10.1145\/327070.327215"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_43_1","DOI":"10.1515\/popets-2017-0034"},{"key":"e_1_3_2_2_44_1","volume-title":"IEEE Symposium on Security and Privacy, S&P","author":"Song Dawn Xiaoding","year":"2000","unstructured":"Dawn Xiaoding Song , D. Wagner , and A. Perrig . 2000. Practical techniques for searches on encrypted data . In IEEE Symposium on Security and Privacy, S&P 2000 . 44--55. Dawn Xiaoding Song, D. Wagner, and A. Perrig. 2000. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, S&P 2000. 44--55."},{"key":"e_1_3_2_2_45_1","volume-title":"Practical Dynamic Searchable Encryption with Small Leakage. In Network and Distributed System Security Symposium, NDSS 2014 .% The Internet Society.","author":"Stefanov Emil","year":"2014","unstructured":"Emil Stefanov , Charalampos Papamanthou , and Elaine Shi . 2014 . Practical Dynamic Searchable Encryption with Small Leakage. In Network and Distributed System Security Symposium, NDSS 2014 .% The Internet Society. Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In Network and Distributed System Security Symposium, NDSS 2014 .% The Internet Society."},{"key":"e_1_3_2_2_46_1","volume-title":"Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Network and Distributed System Security Symposium, NDSS 2021 .% The Internet Society.","author":"Sun Shifeng","year":"2021","unstructured":"Shifeng Sun , Ron Steinfeld , Shangqi Lai , Xingliang Yuan , Amin Sakzad , Joseph K. Liu , Surya Nepal , and Dawu Gu . 2021 . Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Network and Distributed System Security Symposium, NDSS 2021 .% The Internet Society. Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, and Dawu Gu. 2021. Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Network and Distributed System Security Symposium, NDSS 2021 .% The Internet Society."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_47_1","DOI":"10.1145\/3243734.3243782"},{"key":"e_1_3_2_2_48_1","volume-title":"IWSEC","author":"Taketani Shunsuke","year":"2015","unstructured":"Shunsuke Taketani and Wakaha Ogata . 2015 . Improvement of UC Secure Searchable Symmetric Encryption Scheme. In Advances in Information and Computer Security , IWSEC 2015. Springer, 135--152. fi Shunsuke Taketani and Wakaha Ogata. 2015. Improvement of UC Secure Searchable Symmetric Encryption Scheme. In Advances in Information and Computer Security, IWSEC 2015. Springer, 135--152. fi"},{"key":"e_1_3_2_2_49_1","volume-title":"Enron Email Dataset (May 7","author":"Project The CALO","year":"2015","unstructured":"The CALO Project . 2015. Enron Email Dataset (May 7 , 2015 Version) . https:\/\/www.cs.cmu.edu\/ enron\/. https:\/\/www.cs.cmu.edu\/ .\/enron\/ The CALO Project. 2015. Enron Email Dataset (May 7, 2015 Version). https:\/\/www.cs.cmu.edu\/ enron\/. https:\/\/www.cs.cmu.edu\/ .\/enron\/"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '22","name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511521","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511521","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511521"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":48,"alternative-id":["10.1145\/3508398.3511521","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511521","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}