{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:51:20Z","timestamp":1769064680936,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100004332","name":"JPMorgan Chase and Company","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004332","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Protocol Labs"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2154732,CCF-2144208,CNS-1652259"],"award-info":[{"award-number":["CNS-2154732,CCF-2144208,CNS-1652259"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Algorand Foundation"},{"DOI":"10.13039\/100016682","name":"VMware","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016682","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560593","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1829-1842","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Leakage Inversion"],"prefix":"10.1145","author":[{"given":"Evgenios M.","family":"Kornaropoulos","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Nathaniel","family":"Moyer","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Charalampos","family":"Papamanthou","sequence":"additional","affiliation":[{"name":"Yale University, New Hampshire, CT, USA"}]},{"given":"Alexandros","family":"Psomas","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Agency for Healthcare Research & Quality ?Healthcare Cost and Utilization Project (HCUP) Nationwide Inpatient Sample (NIS) \" www.hcup-us.ahrq.gov\/nisoverview.jsp 2009.  Agency for Healthcare Research & Quality ?Healthcare Cost and Utilization Project (HCUP) Nationwide Inpatient Sample (NIS) \" www.hcup-us.ahrq.gov\/nisoverview.jsp 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96131-6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0098"},{"key":"e_1_3_2_1_4_1","volume-title":"past,\" lists.apache.org\/list.html?javauser@ lucene.apache.org","year":"2005","unstructured":"Apache.org, \"Java-user@lucene.apache.org , past,\" lists.apache.org\/list.html?javauser@ lucene.apache.org , 2005 --2011. Apache.org, \"Java-user@lucene.apache.org, past,\" lists.apache.org\/list.html?javauser@ lucene.apache.org, 2005--2011."},{"key":"e_1_3_2_1_5_1","first-page":"1101","volume-title":"?Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations,\" in Proc. of the 48th ACM STOC","author":"Asharov G.","year":"2016","unstructured":"G. Asharov , M. Naor , G. Segev , and I. Shahaf , ?Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations,\" in Proc. of the 48th ACM STOC , 2016 , pp. 1101 -- 1114 . G. Asharov, M. Naor, G. Segev, and I. Shahaf, ?Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations,\" in Proc. of the 48th ACM STOC, 2016, pp. 1101--1114."},{"key":"e_1_3_2_1_6_1","volume-title":"Revisiting Leakage Abuse Attacks,\" in Proc. of the 27th NDSS","author":"Blackstone L.","year":"2020","unstructured":"L. Blackstone , S. Kamara , and T. Moataz , \" Revisiting Leakage Abuse Attacks,\" in Proc. of the 27th NDSS , 2020 . L. Blackstone, S. Kamara, and T. Moataz, \"Revisiting Leakage Abuse Attacks,\" in Proc. of the 27th NDSS, 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0084"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_6"},{"key":"e_1_3_2_1_9_1","first-page":"1143","volume-title":"Forward Secure Searchable Encryption,\" in Proc. of the 23rd ACM CCS","author":"Bost R.","year":"2016","unstructured":"R. Bost , \"\u03a3o\u03c6o\u03c2 : Forward Secure Searchable Encryption,\" in Proc. of the 23rd ACM CCS , 2016 , pp. 1143 -- 1154 . R. Bost, \"\u03a3o\u03c6o\u03c2: Forward Secure Searchable Encryption,\" in Proc. of the 23rd ACM CCS, 2016, pp. 1143--1154."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0062"},{"key":"e_1_3_2_1_11_1","first-page":"1465","volume-title":"Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives,\" in Proc. of the 24th ACM CCS","author":"Bost R.","year":"2017","unstructured":"R. Bost , B. Minaud , and O. Ohrimenko , \" Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives,\" in Proc. of the 24th ACM CCS , 2017 , pp. 1465 -- 1482 . R. Bost, B. Minaud, and O. Ohrimenko, \"Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives,\" in Proc. of the 24th ACM CCS, 2017, pp. 1465--1482."},{"key":"e_1_3_2_1_12_1","first-page":"668","volume-title":"Leakage-Abuse Attacks Against Searchable Encryption,\" in Proc. of the 22nd ACM CCS","author":"Cash D.","year":"2015","unstructured":"D. Cash , P. Grubbs , J. Perry , and T. Ristenpart , \" Leakage-Abuse Attacks Against Searchable Encryption,\" in Proc. of the 22nd ACM CCS , 2015 , pp. 668 -- 679 . D. Cash, P. Grubbs, J. Perry, and T. Ristenpart, \"Leakage-Abuse Attacks Against Searchable Encryption,\" in Proc. of the 22nd ACM CCS, 2015, pp. 668--679."},{"key":"e_1_3_2_1_13_1","volume-title":"Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation,\" in Proc. of the 21st NDSS","author":"Cash D.","year":"2014","unstructured":"D. Cash , J. Jaeger , S. Jarecki , C. S. Jutla , H. Krawczyk , M. Rosu , and M. Steiner , \" Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation,\" in Proc. of the 21st NDSS , 2014 . D. Cash, J. Jaeger, S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, \"Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation,\" in Proc. of the 21st NDSS, 2014."},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Highly- Scalable Searchable Symmetric Encryption with Support for Boolean Queries,\" in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference","author":"Cash D.","year":"2013","unstructured":"D. Cash , S. Jarecki , C. S. Jutla , H. Krawczyk , M. Rosu , and M. Steiner , \" Highly- Scalable Searchable Symmetric Encryption with Support for Boolean Queries,\" in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference , ser. Lecture Notes in Computer Science , vol. 8042 . Springer , 2013 , pp. 353 -- 373 . D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, \"Highly- Scalable Searchable Symmetric Encryption with Support for Boolean Queries,\" in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, ser. Lecture Notes in Computer Science, vol. 8042. Springer, 2013, pp. 353--373."},{"key":"e_1_3_2_1_15_1","first-page":"351","volume-title":"The Locality of Searchable Symmetric Encryption,\" in Proc. of IACR - EUROCRYPT","author":"Cash D.","year":"2014","unstructured":"D. Cash and S. Tessaro , \" The Locality of Searchable Symmetric Encryption,\" in Proc. of IACR - EUROCRYPT , 2014 , pp. 351 -- 368 . D. Cash and S. Tessaro, \"The Locality of Searchable Symmetric Encryption,\" in Proc. of IACR - EUROCRYPT, 2014, pp. 351--368."},{"key":"e_1_3_2_1_16_1","first-page":"2425","volume-title":"Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions,\" in Proc. of the 31st USENIX Security Symposium","author":"Chamani J. G.","year":"2022","unstructured":"J. G. Chamani , D. Papadopoulos , M. Karbasforushan , and I. Demertzis , \" Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions,\" in Proc. of the 31st USENIX Security Symposium , 2022 , pp. 2425 -- 2442 . J. G. Chamani, D. Papadopoulos, M. Karbasforushan, and I. Demertzis, \"Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions,\" in Proc. of the 31st USENIX Security Symposium, 2022, pp. 2425--2442."},{"key":"e_1_3_2_1_17_1","first-page":"1038","volume-title":"New Constructions for Forward and Backward Private Symmetric Searchable Encryption,\" in Proc. of 25th ACM CCS","author":"Chamani J. G.","year":"2018","unstructured":"J. G. Chamani , D. Papadopoulos , C. Papamanthou , and R. Jalili , \" New Constructions for Forward and Backward Private Symmetric Searchable Encryption,\" in Proc. of 25th ACM CCS , 2018 , pp. 1038 -- 1055 . J. G. Chamani, D. Papadopoulos, C. Papamanthou, and R. Jalili, \"New Constructions for Forward and Backward Private Symmetric Searchable Encryption,\" in Proc. of 25th ACM CCS, 2018, pp. 1038--1055."},{"key":"e_1_3_2_1_18_1","first-page":"79","volume-title":"Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,\" in Proc. of the 13th ACM CCS","author":"Curtmola R.","year":"2006","unstructured":"R. Curtmola , J. A. Garay , S. Kamara , and R. Ostrovsky , \" Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,\" in Proc. of the 13th ACM CCS , 2006 , pp. 79 -- 88 . R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, \"Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,\" in Proc. of the 13th ACM CCS, 2006, pp. 79--88."},{"key":"e_1_3_2_1_19_1","first-page":"143","volume-title":"A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents,\" in 30th USENIX Security Symposium","author":"Damie M.","year":"2021","unstructured":"M. Damie , F. Hahn , and A. Peter , \" A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents,\" in 30th USENIX Security Symposium , 2021 , pp. 143 -- 160 . M. Damie, F. Hahn, and A. Peter, \"A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents,\" in 30th USENIX Security Symposium, 2021, pp. 143--160."},{"key":"e_1_3_2_1_20_1","volume-title":"Dynamic Searchable Encryption with Small Client Storage,\" in Proc. of the 27th NDSS","author":"Demertzis I.","year":"2020","unstructured":"I. Demertzis , J. G. Chamani , D. Papadopoulos , and C. Papamanthou , \" Dynamic Searchable Encryption with Small Client Storage,\" in Proc. of the 27th NDSS , 2020 . I. Demertzis, J. G. Chamani, D. Papadopoulos, and C. Papamanthou, \"Dynamic Searchable Encryption with Small Client Storage,\" in Proc. of the 27th NDSS, 2020."},{"key":"e_1_3_2_1_21_1","first-page":"371","volume-title":"Searchable encryption with optimal locality: Achieving sublogarithmic read efficiency,\" in Proc. of the 38th CRYPTO","author":"Demertzis I.","year":"2018","unstructured":"I. Demertzis , D. Papadopoulos , and C. Papamanthou , \" Searchable encryption with optimal locality: Achieving sublogarithmic read efficiency,\" in Proc. of the 38th CRYPTO , 2018 , pp. 371 -- 406 . I. Demertzis, D. Papadopoulos, and C. Papamanthou, \"Searchable encryption with optimal locality: Achieving sublogarithmic read efficiency,\" in Proc. of the 38th CRYPTO, 2018, pp. 371--406."},{"key":"e_1_3_2_1_22_1","first-page":"2433","volume-title":"SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage,\" in 29th USENIX Security Symposium","author":"Demertzis I.","year":"2020","unstructured":"I. Demertzis , D. Papadopoulos , C. Papamanthou , and S. Shintre , \" SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage,\" in 29th USENIX Security Symposium , 2020 , pp. 2433 -- 2450 . I. Demertzis, D. Papadopoulos, C. Papamanthou, and S. Shintre, \"SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage,\" in 29th USENIX Security Symposium, 2020, pp. 2433--2450."},{"key":"e_1_3_2_1_23_1","first-page":"185","article-title":"Practical Private Range Search Revisited","author":"Demertzis I.","year":"2016","unstructured":"I. Demertzis , S. Papadopoulos , O. Papapetrou , A. Deligiannakis , and M. Garofalakis , \" Practical Private Range Search Revisited ,\" in Proc. of ACM SIGMOD , 2016 , pp. 185 -- 198 . I. Demertzis, S. Papadopoulos, O. Papapetrou, A. Deligiannakis, and M. Garofalakis, \"Practical Private Range Search Revisited,\" in Proc. of ACM SIGMOD, 2016, pp. 185--198.","journal-title":"Proc. of ACM SIGMOD"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167971"},{"key":"e_1_3_2_1_25_1","first-page":"1053","article-title":"Fast Searchable Encryption With Tunable Locality","author":"Demertzis I.","year":"2017","unstructured":"I. Demertzis and C. Papamanthou , \" Fast Searchable Encryption With Tunable Locality ,\" in Proc. of ACM SIGMOD , 2017 , pp. 1053 -- 1067 . I. Demertzis and C. Papamanthou, \"Fast Searchable Encryption With Tunable Locality,\" in Proc. of ACM SIGMOD, 2017, pp. 1053--1067.","journal-title":"Proc. of ACM SIGMOD"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0002"},{"key":"e_1_3_2_1_27_1","first-page":"123","volume-title":"Rich Queries on Encrypted Data: Beyond Exact Matches,\" in Proc. of the 20th ESORICS","author":"Faber S.","year":"2015","unstructured":"S. Faber , S. Jarecki , H. Krawczyk , Q. Nguyen , M. Rosu , and M. Steiner , \" Rich Queries on Encrypted Data: Beyond Exact Matches,\" in Proc. of the 20th ESORICS , 2015 , pp. 123 -- 145 . S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M. Rosu, and M. Steiner, \"Rich Queries on Encrypted Data: Beyond Exact Matches,\" in Proc. of the 20th ESORICS, 2015, pp. 123--145."},{"key":"e_1_3_2_1_28_1","volume-title":"Full Database Reconstruction in Two Dimensions,\" in Proc of the 27th ACM CCS","author":"Falzon F.","year":"2020","unstructured":"F. Falzon , E. A. Markatou , Akshima, D. Cash , A. Rivkin , J. Stern , and R. Tamassia , \" Full Database Reconstruction in Two Dimensions,\" in Proc of the 27th ACM CCS , 2020 . F. Falzon, E. A. Markatou, Akshima, D. Cash, A. Rivkin, J. Stern, and R. Tamassia, \"Full Database Reconstruction in Two Dimensions,\" in Proc of the 27th ACM CCS, 2020."},{"key":"e_1_3_2_1_29_1","first-page":"370","volume-title":"Structured Encryption and Dynamic Leakage Suppression,\" in Proc. of IACR - EUROCRYPT","author":"George M.","year":"2021","unstructured":"M. George , S. Kamara , and T. Moataz , \" Structured Encryption and Dynamic Leakage Suppression,\" in Proc. of IACR - EUROCRYPT , 2021 , pp. 370 -- 396 . M. George, S. Kamara, and T. Moataz, \"Structured Encryption and Dynamic Leakage Suppression,\" in Proc. of IACR - EUROCRYPT, 2021, pp. 370--396."},{"key":"e_1_3_2_1_30_1","first-page":"496","volume-title":"Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks,\" in Proc. of the 40th IEEE S&P","author":"Grubbs P.","year":"2019","unstructured":"P. Grubbs , M. Lacharit\u00e9 , B. Minaud , and K. G. Paterson , \" Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks,\" in Proc. of the 40th IEEE S&P , 2019 , pp. 496 -- 512 . P. Grubbs, M. Lacharit\u00e9, B. Minaud, and K. G. Paterson, \"Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks,\" in Proc. of the 40th IEEE S&P, 2019, pp. 496--512."},{"key":"e_1_3_2_1_31_1","first-page":"315","volume-title":"Practical Database Reconstruction from","author":"Grubbs P.","unstructured":"P. Grubbs , M. Lacharit\u00e9 , B. Minaud , and K. G. Paterson : Practical Database Reconstruction from Volume Leakage on Range Queries,\" in Proc. of the 25th ACM CCS, 2018 , pp. 315 -- 331 . --, \"Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries,\" in Proc. of the 25th ACM CCS, 2018, pp. 315--331."},{"key":"e_1_3_2_1_32_1","first-page":"361","volume-title":"New","author":"Gui Z.","unstructured":"Z. Gui , O. Johnson , and B. Warinschi , \" Encrypted Databases : New Volume Attacks against Range Queries,\" in Proc. of the 26th ACM CCS, 2019 , pp. 361 -- 378 . Z. Gui, O. Johnson, and B.Warinschi, \"Encrypted Databases: New Volume Attacks against Range Queries,\" in Proc. of the 26th ACM CCS, 2019, pp. 361--378."},{"key":"e_1_3_2_1_33_1","volume-title":"Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation,\" in Proc. of the 19th NDSS","author":"Islam M. S.","year":"2012","unstructured":"M. S. Islam , M. Kuzu , and M. Kantarcioglu , \" Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation,\" in Proc. of the 19th NDSS , 2012 . M. S. Islam, M. Kuzu, and M. Kantarcioglu, \"Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation,\" in Proc. of the 19th NDSS, 2012."},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption,\" in Proc. of the 34th IEEE Computer Security Foundations Symposium -- CSF","author":"Jurado M.","year":"2021","unstructured":"M. Jurado , C. Palamidessi , and G. Smith , \" A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption,\" in Proc. of the 34th IEEE Computer Security Foundations Symposium -- CSF , 2021 , pp. 1 -- 16 . M. Jurado, C. Palamidessi, and G. Smith, \"A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption,\" in Proc. of the 34th IEEE Computer Security Foundations Symposium -- CSF, 2021, pp. 1--16."},{"key":"e_1_3_2_1_35_1","first-page":"129","article-title":"Quantifying Information Leakage of Deterministic Encryption","author":"Jurado M.","year":"2019","unstructured":"M. Jurado and G. Smith , \" Quantifying Information Leakage of Deterministic Encryption ,\" in Proceedings of the ACM SIGSAC Conference on Cloud Computing Security Workshop , 2019 , pp. 129 -- 139 . M. Jurado and G. Smith, \"Quantifying Information Leakage of Deterministic Encryption,\" in Proceedings of the ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019, pp. 129--139.","journal-title":"Proceedings of the ACM SIGSAC Conference on Cloud Computing Security Workshop"},{"key":"e_1_3_2_1_36_1","first-page":"90","volume-title":"SoK: Cryptanalysis of Encrypted Search with LEAKER - A Framework for LEakage Attack Evaluation on Real-World Data,\" in Proc. of the 7th IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Kamara S.","year":"2022","unstructured":"S. Kamara , A. Kati , T. Moataz , T. Schneider , A. Treiber , and M. Yonli , \" SoK: Cryptanalysis of Encrypted Search with LEAKER - A Framework for LEakage Attack Evaluation on Real-World Data,\" in Proc. of the 7th IEEE European Symposium on Security and Privacy (EuroS&P) , 2022 , pp. 90 -- 108 . S. Kamara, A. Kati, T. Moataz, T. Schneider, A. Treiber, and M. Yonli, \"SoK: Cryptanalysis of Encrypted Search with LEAKER - A Framework for LEakage Attack Evaluation on Real-World Data,\" in Proc. of the 7th IEEE European Symposium on Security and Privacy (EuroS&P), 2022, pp. 90--108."},{"key":"e_1_3_2_1_37_1","first-page":"94","volume-title":"Boolean Searchable Symmetric Encryption with Worst- Case Sub-linear Complexity,\" in Proc. of IACR - EUROCRYPT","author":"Kamara S.","year":"2017","unstructured":"S. Kamara and T. Moataz , \" Boolean Searchable Symmetric Encryption with Worst- Case Sub-linear Complexity,\" in Proc. of IACR - EUROCRYPT , 2017 , pp. 94 -- 124 . S. Kamara and T. Moataz, \"Boolean Searchable Symmetric Encryption with Worst- Case Sub-linear Complexity,\" in Proc. of IACR - EUROCRYPT, 2017, pp. 94--124."},{"key":"e_1_3_2_1_38_1","first-page":"183","volume-title":"Proc. of IACR - EUROCRYPT","author":"Kamara S.","year":"2019","unstructured":"S. Kamara and T. Moataz in Proc. of IACR - EUROCRYPT , 2019 , pp. 183 -- 213 . --, \"Computationally Volume-Hiding Structured Encryption,\" in Proc. of IACR - EUROCRYPT, 2019, pp. 183--213."},{"key":"e_1_3_2_1_39_1","first-page":"339","volume-title":"Structured Encryption and Leakage Suppression,\" in Proc. of the 38th CRYPTO","author":"Kamara S.","year":"2018","unstructured":"S. Kamara , T. Moataz , and O. Ohrimenko , \" Structured Encryption and Leakage Suppression,\" in Proc. of the 38th CRYPTO , 2018 , pp. 339 -- 370 . S. Kamara, T. Moataz, and O. Ohrimenko, \"Structured Encryption and Leakage Suppression,\" in Proc. of the 38th CRYPTO, 2018, pp. 339--370."},{"key":"e_1_3_2_1_40_1","first-page":"258","volume-title":"Parallel and Dynamic Searchable Symmetric Encryption,\" in Proc. of the 17th International Conference in Financial Cryptography and Data Security -- FC","author":"Kamara S.","year":"2013","unstructured":"S. Kamara and C. Papamanthou , \" Parallel and Dynamic Searchable Symmetric Encryption,\" in Proc. of the 17th International Conference in Financial Cryptography and Data Security -- FC , 2013 , pp. 258 -- 274 . S. Kamara and C. Papamanthou, \"Parallel and Dynamic Searchable Symmetric Encryption,\" in Proc. of the 17th International Conference in Financial Cryptography and Data Security -- FC, 2013, pp. 258--274."},{"key":"e_1_3_2_1_41_1","first-page":"965","volume-title":"Dynamic Searchable Symmetric Encryption,\" in Proc. of the 19th ACM CCS","author":"Kamara S.","year":"2012","unstructured":"S. Kamara , C. Papamanthou , and T. Roeder , \" Dynamic Searchable Symmetric Encryption,\" in Proc. of the 19th ACM CCS , 2012 , pp. 965 -- 976 . S. Kamara, C. Papamanthou, and T. Roeder, \"Dynamic Searchable Symmetric Encryption,\" in Proc. of the 19th ACM CCS, 2012, pp. 965--976."},{"key":"e_1_3_2_1_42_1","first-page":"1329","volume-title":"Proc. of the 23rd ACM CCS","author":"Kellaris G.","year":"2016","unstructured":"G. Kellaris , G. Kollios , K. Nissim , and A. O'Neill , \" Generic Attacks on Secure Outsourced Databases ,\" in Proc. of the 23rd ACM CCS , 2016 , pp. 1329 -- 1340 . G. Kellaris, G. Kollios, K. Nissim, and A. O'Neill, \"Generic Attacks on Secure Outsourced Databases,\" in Proc. of the 23rd ACM CCS, 2016, pp. 1329--1340."},{"key":"e_1_3_2_1_43_1","volume-title":"Introducing the Enron Corpus,\" First Conference on Email and Anti Spam (CEAS)","author":"Klimt B.","year":"2004","unstructured":"B. Klimt and Y. Yang , \" Introducing the Enron Corpus,\" First Conference on Email and Anti Spam (CEAS) , 2004 . B. Klimt and Y. Yang, \"Introducing the Enron Corpus,\" First Conference on Email and Anti Spam (CEAS), 2004."},{"key":"e_1_3_2_1_44_1","volume-title":"Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage,\" in Proc. of the 40th IEEE S&P","author":"Kornaropoulos E. M.","year":"2019","unstructured":"E. M. Kornaropoulos , C. Papamanthou , and R. Tamassia , \" Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage,\" in Proc. of the 40th IEEE S&P , 2019 . E. M. Kornaropoulos, C. Papamanthou, and R. Tamassia, \"Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage,\" in Proc. of the 40th IEEE S&P, 2019."},{"key":"e_1_3_2_1_45_1","volume-title":"Attacks on Encrypted Databases Beyond the Uniform Query Distribution,\" in Proc. of the 41th IEEE S&P","author":"Kornaropoulos E. M.","year":"2020","unstructured":"E. M. Kornaropoulos , C. Papamanthou , and R. Tamassia : Attacks on Encrypted Databases Beyond the Uniform Query Distribution,\" in Proc. of the 41th IEEE S&P , 2020 . --, \"The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution,\" in Proc. of the 41th IEEE S&P, 2020."},{"key":"e_1_3_2_1_46_1","volume-title":"Revisiting Security via Parametrized Leakage-Abuse Attacks,\" in Proc. of the 42nd IEEE S&P","author":"Kornaropoulos E. M.","year":"2021","unstructured":"E. M. Kornaropoulos , C. Papamanthou , and R. Tamassia : Revisiting Security via Parametrized Leakage-Abuse Attacks,\" in Proc. of the 42nd IEEE S&P , 2021 . --, \"Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks,\" in Proc. of the 42nd IEEE S&P, 2021."},{"key":"e_1_3_2_1_47_1","first-page":"2243","volume-title":"Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions,\" in Proc of the 28th ACM CCS","author":"Markatou E. A.","year":"2021","unstructured":"E. A. Markatou , F. Falzon , R. Tamassia , and W. Schor , \" Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions,\" in Proc of the 28th ACM CCS , 2021 , pp. 2243 -- 2261 . E. A. Markatou, F. Falzon, R. Tamassia, and W. Schor, \"Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions,\" in Proc of the 28th ACM CCS, 2021, pp. 2243--2261."},{"key":"e_1_3_2_1_48_1","volume-title":"Full Database Reconstruction with Access and Search Pattern Leakage,\" in Proc. of the 22nd ISC","author":"Markatou E. A.","year":"2019","unstructured":"E. A. Markatou and R. Tamassia , \" Full Database Reconstruction with Access and Search Pattern Leakage,\" in Proc. of the 22nd ISC , 2019 . E. A. Markatou and R. Tamassia, \"Full Database Reconstruction with Access and Search Pattern Leakage,\" in Proc. of the 22nd ISC, 2019."},{"key":"e_1_3_2_1_49_1","unstructured":"Medical Information Mart for Intensive Care \"MIMIC-III \" mimic.mit.edu 2001- 2012.  Medical Information Mart for Intensive Care \"MIMIC-III \" mimic.mit.edu 2001- 2012."},{"key":"e_1_3_2_1_50_1","volume-title":"Dynamic Local Searchable Symmetric Encryption,\" arXiv--CoRR","author":"Minaud B.","year":"2022","unstructured":"B. Minaud and M. Reichle , \" Dynamic Local Searchable Symmetric Encryption,\" arXiv--CoRR , vol. abs\/ 2201 .05006, 2022 . B. Minaud and M. Reichle, \"Dynamic Local Searchable Symmetric Encryption,\" arXiv--CoRR, vol. abs\/2201.05006, 2022."},{"key":"e_1_3_2_1_51_1","first-page":"127","volume-title":"Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption,\" in Proc. of the 30th USENIX Security Symposium","author":"Oya S.","year":"2021","unstructured":"S. Oya and F. Kerschbaum , \" Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption,\" in Proc. of the 30th USENIX Security Symposium , 2021 , pp. 127 -- 142 . S. Oya and F. Kerschbaum, \"Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption,\" in Proc. of the 30th USENIX Security Symposium, 2021, pp. 127--142."},{"key":"e_1_3_2_1_52_1","first-page":"79","volume-title":"Mitigating Leakage in Secure Cloud- Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing,\" in Proc. of the 26th ACM CCS","author":"Patel S.","year":"2019","unstructured":"S. Patel , G. Persiano , K. Yeo , and M. Yung , \" Mitigating Leakage in Secure Cloud- Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing,\" in Proc. of the 26th ACM CCS , 2019 , pp. 79 -- 93 . S. Patel, G. Persiano, K. Yeo, and M. Yung, \"Mitigating Leakage in Secure Cloud- Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing,\" in Proc. of the 26th ACM CCS, 2019, pp. 79--93."},{"key":"e_1_3_2_1_53_1","first-page":"1341","volume-title":"Efficiently Searchable Encryption,\" in Proc. of the 23rd ACM CCS","author":"Pouliot D.","year":"2016","unstructured":"D. Pouliot and C. V. Wright , \" The Shadow Nemesis: Inference Attacks on Efficiently Deployable , Efficiently Searchable Encryption,\" in Proc. of the 23rd ACM CCS , 2016 , pp. 1341 -- 1352 . D. Pouliot and C. V. Wright, \"The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption,\" in Proc. of the 23rd ACM CCS, 2016, pp. 1341--1352."},{"key":"e_1_3_2_1_54_1","volume-title":"Obfuscated Access and Search Patterns in Searchable Encryption,\" in Proc. of the 28th NDSS","author":"Shang Z.","year":"2021","unstructured":"Z. Shang , S. Oya , A. Peter , and F. Kerschbaum , \" Obfuscated Access and Search Patterns in Searchable Encryption,\" in Proc. of the 28th NDSS , 2021 . Z. Shang, S. Oya, A. Peter, and F. Kerschbaum, \"Obfuscated Access and Search Patterns in Searchable Encryption,\" in Proc. of the 28th NDSS, 2021."},{"key":"e_1_3_2_1_55_1","first-page":"44","volume-title":"Practical Techniques for Searches on Encrypted Data,\" in Proc. of the 21st IEEE S&P","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. A. Wagner , and A. Perrig , \" Practical Techniques for Searches on Encrypted Data,\" in Proc. of the 21st IEEE S&P , 2000 , pp. 44 -- 55 . D. X. Song, D. A. Wagner, and A. Perrig, \"Practical Techniques for Searches on Encrypted Data,\" in Proc. of the 21st IEEE S&P, 2000, pp. 44--55."},{"key":"e_1_3_2_1_56_1","volume-title":"Practical Dynamic Searchable Encryption with Small Leakage,\" in Proc. of the 21st NDSS","author":"Stefanov E.","year":"2014","unstructured":"E. Stefanov , C. Papamanthou , and E. Shi , \" Practical Dynamic Searchable Encryption with Small Leakage,\" in Proc. of the 21st NDSS , 2014 . E. Stefanov, C. Papamanthou, and E. Shi, \"Practical Dynamic Searchable Encryption with Small Leakage,\" in Proc. of the 21st NDSS, 2014."},{"key":"e_1_3_2_1_57_1","unstructured":"United Kingdom Government Legal Department \"Organogram of Staff Roles & Salaries \" www.data.gov.uk\/dataset\/34d08a53-6b96-4fb6-b043-627e2b25840d\/ organogram-of-staff-roles-salaries 2018.  United Kingdom Government Legal Department \"Organogram of Staff Roles & Salaries \" www.data.gov.uk\/dataset\/34d08a53-6b96-4fb6-b043-627e2b25840d\/ organogram-of-staff-roles-salaries 2018."},{"key":"e_1_3_2_1_58_1","volume-title":"Practical Volume-Based Attacks on Encrypted Databases,\" in Proc. of the 5th IEEE EuroS&P","author":"Wang S.","year":"2020","unstructured":"S. Wang , R. Poddar , J. Lu , and R. A. Popa , \" Practical Volume-Based Attacks on Encrypted Databases,\" in Proc. of the 5th IEEE EuroS&P , 2020 . S. Wang, R. Poddar, J. Lu, and R. A. Popa, \"Practical Volume-Based Attacks on Encrypted Databases,\" in Proc. of the 5th IEEE EuroS&P, 2020."},{"key":"e_1_3_2_1_59_1","first-page":"707","volume-title":"All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption,\" in Proc. of the 25th USENIX Security","author":"Zhang Y.","year":"2016","unstructured":"Y. Zhang , J. Katz , and C. Papamanthou , \" All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption,\" in Proc. of the 25th USENIX Security , 2016 , pp. 707 -- 720 . Y. Zhang, J. Katz, and C. Papamanthou, \"All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption,\" in Proc. of the 25th USENIX Security, 2016, pp. 707--720."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560593","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:58Z","timestamp":1750182658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560593"}},"subtitle":["Towards Quantifying Privacy in Searchable Encryption"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":59,"alternative-id":["10.1145\/3548606.3560593","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560593","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}