{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T07:44:46Z","timestamp":1778658286316,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":139,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2054869"],"award-info":[{"award-number":["CNS-2054869"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1145\/3600006.3613134","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T14:44:17Z","timestamp":1696344257000},"page":"396-416","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Private Web Search with Tiptoe"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2346-809X","authenticated-orcid":false,"given":"Alexandra","family":"Henzinger","sequence":"first","affiliation":[{"name":"MIT, Cambridge, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0025-1742","authenticated-orcid":false,"given":"Emma","family":"Dauterman","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7577-4512","authenticated-orcid":false,"given":"Henry","family":"Corrigan-Gibbs","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0238-2703","authenticated-orcid":false,"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,10,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"accessed","author":"New","year":"2023","unstructured":"New tweets per second record, and how! https:\/\/blog.twitter.com\/engineering\/en_us\/a\/2013\/new-tweets-per-second-record-and-how , accessed 17 April 2023 , 2013. New tweets per second record, and how! https:\/\/blog.twitter.com\/engineering\/en_us\/a\/2013\/new-tweets-per-second-record-and-how, accessed 17 April 2023, 2013."},{"key":"e_1_3_2_2_2_1","volume-title":"https:\/\/www.loc.gov\/static\/portals\/about\/reports-and-budgets\/documents\/annual-reports\/fy2021.pdf, accessed","author":"Annual","year":"2023","unstructured":"Annual report of the librarian of congress. https:\/\/www.loc.gov\/static\/portals\/about\/reports-and-budgets\/documents\/annual-reports\/fy2021.pdf, accessed 17 April 2023 , 2021. Annual report of the librarian of congress. https:\/\/www.loc.gov\/static\/portals\/about\/reports-and-budgets\/documents\/annual-reports\/fy2021.pdf, accessed 17 April 2023, 2021."},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Google_Knowledge_Graph, accessed","author":"Google","year":"2023","unstructured":"Google knowledge graph. https:\/\/en.wikipedia.org\/wiki\/Google_Knowledge_Graph, accessed 17 April 2023 , 2023. Google knowledge graph. https:\/\/en.wikipedia.org\/wiki\/Google_Knowledge_Graph, accessed 17 April 2023, 2023."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574251"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483586"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_2_7_1","first-page":"1811","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Ali Asra","year":"2021","unstructured":"Asra Ali , Tancr\u00e8de Lepoint , Sarvar Patel , Mariana Raykova , Phillipp Schoppmann , Karn Seth , and Kevin Yeo . Communication-Computation trade-offs in PIR . In Proceedings of the 30th USENIX Security Symposium , pages 1811 -- 1828 , Vancouver, Canada , August 2021 . Asra Ali, Tancr\u00e8de Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, and Kevin Yeo. Communication-Computation trade-offs in PIR. In Proceedings of the 30th USENIX Security Symposium, pages 1811--1828, Vancouver, Canada, August 2021."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026920"},{"key":"e_1_3_2_2_10_1","unstructured":"Apache Software Foundation. Lucene 2023. https:\/\/lucene.apache.org\/.  Apache Software Foundation. Lucene 2023. https:\/\/lucene.apache.org\/."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-015-9256-0"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366030.3366081"},{"key":"e_1_3_2_2_13_1","volume-title":"August","author":"Arrington Michael","year":"2006","unstructured":"Michael Arrington . AOL proudly releases massive amounts of private data , August 2006 . https:\/\/techcrunch.com\/2006\/08\/06\/aol-proudly-releases-massive-amounts-of-user-search-data\/. Michael Arrington. AOL proudly releases massive amounts of private data, August 2006. https:\/\/techcrunch.com\/2006\/08\/06\/aol-proudly-releases-massive-amounts-of-user-search-data\/."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196959.3196976"},{"key":"e_1_3_2_2_15_1","first-page":"491","volume-title":"Proceedings of the 33rd IEEE Symposium on Security and Privacy","author":"Balsa Ero","year":"2012","unstructured":"Ero Balsa , Carmela Troncoso , and Claudia Diaz . OBPWS : Obfuscation-based private web search . In Proceedings of the 33rd IEEE Symposium on Security and Privacy , pages 491 -- 505 , San Francisco, CA , May 2012 . Ero Balsa, Carmela Troncoso, and Claudia Diaz. OBPWS: Obfuscation-based private web search. In Proceedings of the 33rd IEEE Symposium on Security and Privacy, pages 491--505, San Francisco, CA, May 2012."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0134-y"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36033-7_16"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"e_1_3_2_2_22_1","volume-title":"February","author":"Chaum David L.","year":"1981","unstructured":"David L. Chaum . Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2) , February 1981 . David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), February 1981."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 29th USENIX Security Symposium, pages 2111--2128, Virtual conference","author":"Chen Hao","year":"2020","unstructured":"Hao Chen , Ilaria Chillotti , Yihe Dong , Oxana Poburinnaya , Ilya Razenshteyn , and M Sadegh Riazi . SANNS : Scaling up secure approximate k-nearest neighbors search . In Proceedings of the 29th USENIX Security Symposium, pages 2111--2128, Virtual conference , August 2020 . Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, and M Sadegh Riazi. SANNS: Scaling up secure approximate k-nearest neighbors search. In Proceedings of the 29th USENIX Security Symposium, pages 2111--2128, Virtual conference, August 2020."},{"key":"e_1_3_2_2_25_1","volume-title":"SPANN: Highly-efficient billion-scale approximate nearest neighbor search","author":"Chen Qi","year":"2021","unstructured":"Qi Chen , Bing Zhao , Haidong Wang , Mingqin Li , Chuanjie Liu , Zengzhong Li , Mao Yang , and Jingdong Wang . SPANN: Highly-efficient billion-scale approximate nearest neighbor search , 2021 . https:\/\/arxiv.org\/abs\/2111.08566. Qi Chen, Bing Zhao, Haidong Wang, Mingqin Li, Chuanjie Liu, Zengzhong Li, Mao Yang, and Jingdong Wang. SPANN: Highly-efficient billion-scale approximate nearest neighbor search, 2021. https:\/\/arxiv.org\/abs\/2111.08566."},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Chen Zitai","year":"2021","unstructured":"Zitai Chen , Georgios Vasilakis , Kit Murdock , Edward Dean , David Oswald , and Flavio D Garcia . VoltPillager : Hardware-based fault injection attacks against intel SGX enclaves using the SVID voltage scaling interface . In Proceedings of the 30th USENIX Security Symposium , Vancouver, Canada , August 2021 . Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio D Garcia. VoltPillager: Hardware-based fault injection attacks against intel SGX enclaves using the SVID voltage scaling interface. In Proceedings of the 30th USENIX Security Symposium, Vancouver, Canada, August 2021."},{"key":"e_1_3_2_2_27_1","volume-title":"Paper 1998\/003","author":"Chor Benny","year":"1998","unstructured":"Benny Chor , Niv Gilboa , and Moni Naor . Private information retrieval by keywords. Cryptology ePrint Archive , Paper 1998\/003 , February 1998 . https:\/\/eprint.iacr.org\/1998\/003. Benny Chor, Niv Gilboa, and Moni Naor. Private information retrieval by keywords. Cryptology ePrint Archive, Paper 1998\/003, February 1998. https:\/\/eprint.iacr.org\/1998\/003."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_1"},{"key":"e_1_3_2_2_30_1","volume-title":"https:\/\/github.com\/criteo\/autofaiss, accessed","year":"2023","unstructured":"Criteo. AutoFaiss. https:\/\/github.com\/criteo\/autofaiss, accessed 16 April 2023 , 2023. Criteo. AutoFaiss. https:\/\/github.com\/criteo\/autofaiss, accessed 16 April 2023, 2023."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483562"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 1101--1119, Virtual conference","author":"Dauterman Emma","year":"2020","unstructured":"Emma Dauterman , Eric Feng , Ellen Luo , Raluca Ada Popa , and Ion Stoica . Dory : An encrypted search system with distributed trust . In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 1101--1119, Virtual conference , November 2020 . Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, and Ion Stoica. Dory: An encrypted search system with distributed trust. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 1101--1119, Virtual conference, November 2020."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833611"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 29th USENIX Security Symposium, Virtual conference","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou , and Saurabh Shintre . SEAL : Attack mitigation for encrypted databases via adjustable leakage . In Proceedings of the 29th USENIX Security Symposium, Virtual conference , August 2020 . Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. SEAL: Attack mitigation for encrypted databases via adjustable leakage. In Proceedings of the 29th USENIX Security Symposium, Virtual conference, August 2020."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3139866"},{"key":"e_1_3_2_2_39_1","volume-title":"Semantic search with FAISS","author":"Face Hugging","year":"2023","unstructured":"Hugging Face . Semantic search with FAISS , 2023 . https:\/\/huggingface.co\/learn\/nlp-course\/chapter5\/6?fw=tf. Hugging Face. Semantic search with FAISS, 2023. https:\/\/huggingface.co\/learn\/nlp-course\/chapter5\/6?fw=tf."},{"key":"e_1_3_2_2_40_1","volume-title":"Paper 2012\/144","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive , Paper 2012\/144 , March 2012 . https:\/\/eprint.iacr.org\/2012\/144. Junfeng Fan and Frederik Vercauteren. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive, Paper 2012\/144, March 2012. https:\/\/eprint.iacr.org\/2012\/144."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3463098"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.10"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_20"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36033-7_17"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660367"},{"key":"e_1_3_2_2_47_1","volume-title":"Paper 2003\/216","author":"Goh Eu-Jin","year":"2003","unstructured":"Eu-Jin Goh . Secure indexes. Cryptology ePrint Archive , Paper 2003\/216 , October 2003 . https:\/\/eprint.iacr.org\/2003\/216. Eu-Jin Goh. Secure indexes. Cryptology ePrint Archive, Paper 2003\/216, October 2003. https:\/\/eprint.iacr.org\/2003\/216."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_2_50_1","unstructured":"Google. In-depth guide to how google search works. https:\/\/developers.google.com\/search\/docs\/fundamentals\/how-search-works.  Google. In-depth guide to how google search works. https:\/\/developers.google.com\/search\/docs\/fundamentals\/how-search-works."},{"key":"e_1_3_2_2_51_1","volume-title":"How Google Search organizes information. https:\/\/www.google.com\/search\/howsearchworks\/how-search-works\/organizing-information\/, accessed","year":"2023","unstructured":"Google. How Google Search organizes information. https:\/\/www.google.com\/search\/howsearchworks\/how-search-works\/organizing-information\/, accessed 17 April 2023 , 2023. Google. How Google Search organizes information. https:\/\/www.google.com\/search\/howsearchworks\/how-search-works\/organizing-information\/, accessed 17 April 2023, 2023."},{"key":"e_1_3_2_2_52_1","volume-title":"How our business works. https:\/\/about.google\/how-our-business-works\/, accessed","year":"2023","unstructured":"Google. How our business works. https:\/\/about.google\/how-our-business-works\/, accessed 17 April 2023 , 2023. Google. How our business works. https:\/\/about.google\/how-our-business-works\/, accessed 17 April 2023, 2023."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978407"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_2_55_1","volume-title":"August","author":"Hafner Katie","year":"2006","unstructured":"Katie Hafner . Researchers yearn to use AOL logs, but they hesitate , August 2006 . https:\/\/www.nytimes.com\/2006\/08\/23\/technology\/23search.html. Katie Hafner. Researchers yearn to use AOL logs, but they hesitate, August 2006. https:\/\/www.nytimes.com\/2006\/08\/23\/technology\/23search.html."},{"key":"e_1_3_2_2_56_1","volume-title":"Proceedings of the 32nd USENIX Security Symposium","author":"Henzinger Alexandra","year":"2022","unstructured":"Alexandra Henzinger , Matthew M. Hong , Henry Corrigan-Gibbs , Sarah Meiklejohn , and Vinod Vaikuntanathan . One server for the price of two: Simple and fast single-server private information retrieval . In Proceedings of the 32nd USENIX Security Symposium , Anaheim, CA , August 2022 . Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan. One server for the price of two: Simple and fast single-server private information retrieval. In Proceedings of the 32nd USENIX Security Symposium, Anaheim, CA, August 2022."},{"key":"e_1_3_2_2_57_1","unstructured":"Sebastian Hofst\u00e4tter Sheng-Chieh Lin Jheng-Hong Yang Jimmy Lin and Allan Hanbury. msmarco-distilbert-base-tas-b model. https:\/\/huggingface.co\/sentence-transformers\/msmarco-distilbert-base-tas-b.  Sebastian Hofst\u00e4tter Sheng-Chieh Lin Jheng-Hong Yang Jimmy Lin and Allan Hanbury. msmarco-distilbert-base-tas-b model. https:\/\/huggingface.co\/sentence-transformers\/msmarco-distilbert-base-tas-b."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462891"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_13"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_2_61_1","first-page":"32","article-title":"Fast accurate billion-point nearest neighbor search on a single node","author":"Subramanya Suhas Jayaram","year":"2019","unstructured":"Suhas Jayaram Subramanya , Fnu Devvrit , Harsha Vardhan Simhadri , Ravishankar Krishnawamy , and Rohan Kadekodi . DiskANN : Fast accurate billion-point nearest neighbor search on a single node . Advances in Neural Information Processing Systems , 32 , 2019 . Suhas Jayaram Subramanya, Fnu Devvrit, Harsha Vardhan Simhadri, Ravishankar Krishnawamy, and Rohan Kadekodi. DiskANN: Fast accurate billion-point nearest neighbor search on a single node. Advances in Neural Information Processing Systems, 32, 2019.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_62_1","volume-title":"March 29","author":"Jegou Herv\u00e9","year":"2017","unstructured":"Herv\u00e9 Jegou , Matthijs Douze , and Jeff Johnson . Faiss: A library for efficient similarity search. https:\/\/engineering.fb.com\/2017\/03\/29\/data-infrastructure\/faiss-a-library-for-efficient-similarity-search\/ , March 29 , 2017 . Herv\u00e9 Jegou, Matthijs Douze, and Jeff Johnson. Faiss: A library for efficient similarity search. https:\/\/engineering.fb.com\/2017\/03\/29\/data-infrastructure\/faiss-a-library-for-efficient-similarity-search\/, March 29, 2017."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2921572"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_2_66_1","volume-title":"Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 39--48, Virtual conference","author":"Khattab Omar","year":"2020","unstructured":"Omar Khattab and Matei Zaharia . Colbert : Efficient and effective passage search via contextualized late interaction over BERT . In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 39--48, Virtual conference , July 2020 . Omar Khattab and Matei Zaharia. Colbert: Efficient and effective passage search via contextualized late interaction over BERT. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 39--48, Virtual conference, July 2020."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"e_1_3_2_2_68_1","unstructured":"UKP Lab. Sentence transformers: Multilingual sentence paragraph and image embeddings using BERT & co. https:\/\/github.com\/UKPLab\/sentence-transformers.  UKP Lab. Sentence transformers: Multilingual sentence paragraph and image embeddings using BERT & co. https:\/\/github.com\/UKPLab\/sentence-transformers."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531833"},{"key":"e_1_3_2_2_70_1","volume-title":"Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 331--347, Virtual conference","author":"Li Mingyu","year":"2021","unstructured":"Mingyu Li , Jinhao Zhu , Tianxu Zhang , Cheng Tan , Yubin Xia , Sebastian Angel , and Haibo Chen . Bringing decentralized search to decentralized services . In Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 331--347, Virtual conference , July 2021 . Mingyu Li, Jinhao Zhu, Tianxu Zhang, Cheng Tan, Yubin Xia, Sebastian Angel, and Haibo Chen. Bringing decentralized search to decentralized services. In Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 331--347, Virtual conference, July 2021."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.repl4nlp-1.17"},{"key":"e_1_3_2_2_72_1","first-page":"740","volume-title":"Proceedings of the 13th European Conference on Computer Vision","author":"Lin Tsung-Yi","year":"2014","unstructured":"Tsung-Yi Lin , Michael Maire , Serge Belongie , James Hays , Pietro Perona , Deva Ramanan , Piotr Doll\u00e1r , and C Lawrence Zitnick . Microsoft COCO : Common objects in context . In Proceedings of the 13th European Conference on Computer Vision , pages 740 -- 755 , Zurich, Switzerland , September 2014 . Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C Lawrence Zitnick. Microsoft COCO: Common objects in context. In Proceedings of the 13th European Conference on Computer Vision, pages 740--755, Zurich, Switzerland, September 2014."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585175"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_2_75_1","volume-title":"HE is all you need: Compressing FHE ciphertexts using additive HE","author":"Mahdavi Rasoul Akhavan","year":"2023","unstructured":"Rasoul Akhavan Mahdavi , Abdulrahman Diaa , and Florian Kerschbaum . HE is all you need: Compressing FHE ciphertexts using additive HE , 2023 . Rasoul Akhavan Mahdavi, Abdulrahman Diaa, and Florian Kerschbaum. HE is all you need: Compressing FHE ciphertexts using additive HE, 2023."},{"key":"e_1_3_2_2_76_1","volume-title":"A survey on bias and fairness in machine learning. ACM computing surveys (CSUR), 54(6):1--35","author":"Mehrabi Ninareh","year":"2021","unstructured":"Ninareh Mehrabi , Fred Morstatter , Nripsuta Saxena , Kristina Lerman , and Aram Galstyan . A survey on bias and fairness in machine learning. ACM computing surveys (CSUR), 54(6):1--35 , 2021 . Ninareh Mehrabi, Fred Morstatter, Nripsuta Saxena, Kristina Lerman, and Aram Galstyan. A survey on bias and fairness in machine learning. ACM computing surveys (CSUR), 54(6):1--35, 2021."},{"key":"e_1_3_2_2_77_1","volume-title":"Proceedings of the 16th Privacy Enhancing Technologies Symposium","author":"Melchor Carlos Aguilar","year":"2016","unstructured":"Carlos Aguilar Melchor , Joris Barrier , Laurent Fousse , and Marc-Olivier Killijian . XPIR : Private information retrieval for everyone . In Proceedings of the 16th Privacy Enhancing Technologies Symposium , Darmstadt, Germany , July 2016 . Carlos Aguilar Melchor, Joris Barrier, Laurent Fousse, and Marc-Olivier Killijian. XPIR: Private information retrieval for everyone. In Proceedings of the 16th Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881423"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833700"},{"key":"e_1_3_2_2_80_1","volume-title":"MS MARCO document ranking leader-board. https:\/\/microsoft.github.io\/MSMARCO-Document-Ranking-Submissions\/leaderboard\/, accessed","year":"2023","unstructured":"Microsoft. MS MARCO document ranking leader-board. https:\/\/microsoft.github.io\/MSMARCO-Document-Ranking-Submissions\/leaderboard\/, accessed 15 April 2023 . Microsoft. MS MARCO document ranking leader-board. https:\/\/microsoft.github.io\/MSMARCO-Document-Ranking-Submissions\/leaderboard\/, accessed 15 April 2023."},{"key":"e_1_3_2_2_81_1","volume-title":"Proceedings of the 1st International Conference on Learning Representations (ICLR)","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . Efficient estimation of word representations in vector space . In Proceedings of the 1st International Conference on Learning Representations (ICLR) , Scottsdale, AZ , May 2013 . Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. Efficient estimation of word representations in vector space. In Proceedings of the 1st International Conference on Learning Representations (ICLR), Scottsdale, AZ, May 2013."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135987"},{"key":"e_1_3_2_2_84_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR)","author":"Mu Jiaqi","year":"2018","unstructured":"Jiaqi Mu and Pramod Viswanath . All-but-the-top : Simple and effective post-processing for word representations . In Proceedings of the 6th International Conference on Learning Representations (ICLR) , Vancouver, Canada, April-- May 2018 . Jiaqi Mu and Pramod Viswanath. All-but-the-top: Simple and effective post-processing for word representations. In Proceedings of the 6th International Conference on Learning Representations (ICLR), Vancouver, Canada, April--May 2018."},{"key":"e_1_3_2_2_85_1","volume-title":"MTEB: Massive text embedding benchmark","author":"Muennighoff Niklas","year":"2023","unstructured":"Niklas Muennighoff , Nouamane Tazi , Lo\u00efc Magne , and Nils Reimers . MTEB: Massive text embedding benchmark , 2023 . https:\/\/arxiv.org\/abs\/2210.07316. Niklas Muennighoff, Nouamane Tazi, Lo\u00efc Magne, and Nils Reimers. MTEB: Massive text embedding benchmark, 2023. https:\/\/arxiv.org\/abs\/2210.07316."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485381"},{"key":"e_1_3_2_2_87_1","volume-title":"Simple and practical single-server sublinear private information retrieval. Cryptology ePrint Archive","author":"Mughees Muhammad Haris","year":"2023","unstructured":"Muhammad Haris Mughees and Ling Ren . Simple and practical single-server sublinear private information retrieval. Cryptology ePrint Archive , 2023 . Muhammad Haris Mughees and Ling Ren. Simple and practical single-server sublinear private information retrieval. Cryptology ePrint Archive, 2023."},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.66"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_3_2_2_91_1","volume-title":"Understanding searches better than ever before","author":"Nayak Pandu","year":"2019","unstructured":"Pandu Nayak . Understanding searches better than ever before , 2019 . https:\/\/blog.google\/products\/search\/search-language-understanding-bert\/. Pandu Nayak. Understanding searches better than ever before, 2019. https:\/\/blog.google\/products\/search\/search-language-understanding-bert\/."},{"key":"e_1_3_2_2_92_1","volume-title":"Proceedings of the Workshop on Cognitive Computation: Integrating Neural and Symbolic Approaches (CoCo@NIPS)","author":"Nguyen Tri","year":"2016","unstructured":"Tri Nguyen , Mir Rosenberg , Xia Song , Jianfeng Gao , Saurabh Tiwary , Rangan Majumder , and Li Deng . MS MARCO : A human generated machine reading comprehension dataset . In Proceedings of the Workshop on Cognitive Computation: Integrating Neural and Symbolic Approaches (CoCo@NIPS) , Barcelona, Spain , December 2016 . Tri Nguyen, Mir Rosenberg, Xia Song, Jianfeng Gao, Saurabh Tiwary, Rangan Majumder, and Li Deng. MS MARCO: A human generated machine reading comprehension dataset. In Proceedings of the Workshop on Cognitive Computation: Integrating Neural and Symbolic Approaches (CoCo@NIPS), Barcelona, Spain, December 2016."},{"key":"e_1_3_2_2_93_1","volume-title":"Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society","author":"Nissenbaum Helen","year":"2009","unstructured":"Helen Nissenbaum and Howe Daniel . TrackMeNot: Resisting surveillance in web search . In Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society . Oxford University Press , 2009 . Helen Nissenbaum and Howe Daniel. TrackMeNot: Resisting surveillance in web search. In Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. Oxford University Press, 2009."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054135"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_96_1","first-page":"587","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Papadimitriou Antonis","year":"2016","unstructured":"Antonis Papadimitriou , Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Andreas Haeberlen , Harmeet Singh , Abhishek Modi , and Saikrishna Badrinarayanan . Big data analytics over encrypted datasets with Seabed . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) , pages 587 -- 602 , Savannah, GA , November 2016 . Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. Big data analytics over encrypted datasets with Seabed. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 587--602, Savannah, GA, November 2016."},{"key":"e_1_3_2_2_97_1","first-page":"359","volume-title":"Proceedings of the 35th IEEE Symposium on Security and Privacy","author":"Pappas Vasilis","year":"2014","unstructured":"Vasilis Pappas , Fernando Krell , Binh Vo , Vladimir Kolesnikov , Tal Malkin , Seung Geol Choi , Wesley George , Angelos Keromytis , and Steve Bellovin . Blind seer : A scalable private DBMS . In Proceedings of the 35th IEEE Symposium on Security and Privacy , pages 359 -- 374 , San Jose, CA , May 2014 . Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos Keromytis, and Steve Bellovin. Blind seer: A scalable private DBMS. In Proceedings of the 35th IEEE Symposium on Security and Privacy, pages 359--374, San Jose, CA, May 2014."},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590636.2590640"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-016-0044-x"},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.421"},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00053"},{"key":"e_1_3_2_2_103_1","first-page":"1664","volume-title":"Proceedings of the 45th International Conference on Very Large Data Bases (VLDB)","author":"Poddar Rishabh","year":"2019","unstructured":"Rishabh Poddar , Tobias Boelter , and Raluca Ada Popa . Arx : an encrypted database using semantically secure encryption . In Proceedings of the 45th International Conference on Very Large Data Bases (VLDB) , pages 1664 -- 1678 , Los Angeles, CA , August 2019 . Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. Arx: an encrypted database using semantically secure encryption. In Proceedings of the 45th International Conference on Very Large Data Bases (VLDB), pages 1664--1678, Los Angeles, CA, August 2019."},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.79"},{"key":"e_1_3_2_2_106_1","volume-title":"Daxiang Dong, Hua Wu, and Haifeng Wang. RocketQA: An optimized training approach to dense passage retrieval for open-domain question answering.","author":"Qu Yingqi","year":"2020","unstructured":"Yingqi Qu , Yuchen Ding , Jing Liu , Kai Liu , Ruiyang Ren , Wayne Xin Zhao , Daxiang Dong, Hua Wu, and Haifeng Wang. RocketQA: An optimized training approach to dense passage retrieval for open-domain question answering. 2020 . https:\/\/arxiv.org\/abs\/2010.08191. Yingqi Qu, Yuchen Ding, Jing Liu, Kai Liu, Ruiyang Ren, Wayne Xin Zhao, Daxiang Dong, Hua Wu, and Haifeng Wang. RocketQA: An optimized training approach to dense passage retrieval for open-domain question answering. 2020. https:\/\/arxiv.org\/abs\/2010.08191."},{"key":"e_1_3_2_2_107_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning (ICML), pages 8748--8763, Virtual conference","author":"Radford Alec","year":"2021","unstructured":"Alec Radford , Jong Wook Kim , Chris Hallacy , Aditya Ramesh , Gabriel Goh , Sandhini Agarwal , Girish Sastry , Amanda Askell , Pamela Mishkin , Jack Clark , Gretchen Krueger , and Ilya Sutskever . Learning transferable visual models from natural language supervision . In Proceedings of the 38th International Conference on Machine Learning (ICML), pages 8748--8763, Virtual conference , July 2021 . Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, Gretchen Krueger, and Ilya Sutskever. Learning transferable visual models from natural language supervision. In Proceedings of the 38th International Conference on Machine Learning (ICML), pages 8748--8763, Virtual conference, July 2021."},{"key":"e_1_3_2_2_108_1","unstructured":"Colin Raffel Noam Shazeer Adam Roberts Katherine Lee Sharan Narang Michael Matena Yanqi Zhou Wei Li and Peter J. Liu. C4 model. https:\/\/huggingface.co\/datasets\/c4.  Colin Raffel Noam Shazeer Adam Roberts Katherine Lee Sharan Narang Michael Matena Yanqi Zhou Wei Li and Peter J. Liu. C4 model. https:\/\/huggingface.co\/datasets\/c4."},{"key":"e_1_3_2_2_109_1","volume-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","author":"Raffel Colin","year":"2019","unstructured":"Colin Raffel , Noam Shazeer , Adam Roberts , Katherine Lee , Sharan Narang , Michael Matena , Yanqi Zhou , Wei Li , and Peter J. Liu . Exploring the limits of transfer learning with a unified text-to-text transformer , 2019 . https:\/\/arxiv.org\/abs\/1910.10683. Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J. Liu. Exploring the limits of transfer learning with a unified text-to-text transformer, 2019. https:\/\/arxiv.org\/abs\/1910.10683."},{"key":"e_1_3_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"e_1_3_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054471"},{"key":"e_1_3_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_2_113_1","first-page":"45","volume-title":"Petr Sojka. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks","author":"\u0158eh\u016f\u0159ek Radim","year":"2010","unstructured":"Radim \u0158eh\u016f\u0159ek and Petr Sojka. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks , pages 45 -- 50 , Valletta, Malta , May 2010 . http:\/\/is.muni.cz\/publication\/884893\/en. Radim \u0158eh\u016f\u0159ek and Petr Sojka. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pages 45--50, Valletta, Malta, May 2010. http:\/\/is.muni.cz\/publication\/884893\/en."},{"key":"e_1_3_2_2_114_1","volume-title":"Sentence-BERT: Sentence embeddings using siamese BERT-networks","author":"Reimers Nils","year":"2019","unstructured":"Nils Reimers and Iryna Gurevych . Sentence-BERT: Sentence embeddings using siamese BERT-networks , 2019 . https:\/\/arxiv.org\/abs\/1908.10084. Nils Reimers and Iryna Gurevych. Sentence-BERT: Sentence embeddings using siamese BERT-networks, 2019. https:\/\/arxiv.org\/abs\/1908.10084."},{"key":"e_1_3_2_2_115_1","volume-title":"Sub-linear privacy-preserving near-neighbor search","author":"Riazi M Sadegh","year":"2016","unstructured":"M Sadegh Riazi , Beidi Chen , Anshumali Shrivastava , Dan Wallach , and Farinaz Koushanfar . Sub-linear privacy-preserving near-neighbor search , 2016 . https:\/\/arxiv.org\/abs\/1612.01835. M Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, and Farinaz Koushanfar. Sub-linear privacy-preserving near-neighbor search, 2016. https:\/\/arxiv.org\/abs\/1612.01835."},{"key":"e_1_3_2_2_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808425.2808429"},{"key":"e_1_3_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557325"},{"key":"e_1_3_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"},{"key":"e_1_3_2_2_119_1","volume-title":"Proceedings of the 2021 NeurIPS Data-Centric AI Workshop","author":"Schuhmann Christoph","year":"2021","unstructured":"Christoph Schuhmann , Richard Vencu , Romain Beaumont , Robert Kaczmarczyk , Clayton Mullis , Aarush Katta , Theo Coombes , Jenia Jitsev , and Aran Komatsuzaki . LAION-400M : Open dataset of CLIP-filtered 400 million image-text pairs . In Proceedings of the 2021 NeurIPS Data-Centric AI Workshop , December 2021 . Christoph Schuhmann, Richard Vencu, Romain Beaumont, Robert Kaczmarczyk, Clayton Mullis, Aarush Katta, Theo Coombes, Jenia Jitsev, and Aran Komatsuzaki. LAION-400M: Open dataset of CLIP-filtered 400 million image-text pairs. In Proceedings of the 2021 NeurIPS Data-Centric AI Workshop, December 2021."},{"key":"e_1_3_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"e_1_3_2_2_121_1","volume-title":"January","author":"Microsoft SEAL","year":"2023","unstructured":"Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL , January 2023 . Microsoft Research , Redmond, WA . Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL, January 2023. Microsoft Research, Redmond, WA."},{"key":"e_1_3_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833702"},{"key":"e_1_3_2_2_123_1","volume-title":"Secure k-ish nearest neighbors classifier","author":"Shaul Hayim","year":"2018","unstructured":"Hayim Shaul , Dan Feldman , and Daniela Rus . Secure k-ish nearest neighbors classifier , 2018 . https:\/\/arxiv.org\/abs\/1801.07301. Hayim Shaul, Dan Feldman, and Daniela Rus. Secure k-ish nearest neighbors classifier, 2018. https:\/\/arxiv.org\/abs\/1801.07301."},{"key":"e_1_3_2_2_124_1","first-page":"44","volume-title":"Proceedings of the 21st IEEE Symposium on Security and Privacy","author":"Song Dawn Xiaoding","year":"2000","unstructured":"Dawn Xiaoding Song , David Wagner , and Adrian Perrig . Practical techniques for searches on encrypted data . In Proceedings of the 21st IEEE Symposium on Security and Privacy , pages 44 -- 55 , Oakland, CA , May 2000 . Dawn Xiaoding Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Proceedings of the 21st IEEE Symposium on Security and Privacy, pages 44--55, Oakland, CA, May 2000."},{"key":"e_1_3_2_2_125_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_2_126_1","volume-title":"Proceedings of the 26th USENIX Security Symposium","author":"Tang Adrian","year":"2017","unstructured":"Adrian Tang , Simha Sethumadhavan , and Salvatore Stolfo . CLKSCREW : exposing the perils of security-oblivious energy management . In Proceedings of the 26th USENIX Security Symposium , Vancouver, Canada , August 2017 . Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo. CLKSCREW: exposing the perils of security-oblivious energy management. In Proceedings of the 26th USENIX Security Symposium, Vancouver, Canada, August 2017."},{"key":"e_1_3_2_2_127_1","volume-title":"Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS)","author":"Toubiana Vincent","year":"2010","unstructured":"Vincent Toubiana , Arvind Narayanan , Dan Boneh , Helen Nissenbaum , and Solon Barocas . Adnostic : Privacy preserving targeted advertising . In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS) , San Diego, CA, February-- March 2010 . Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy preserving targeted advertising. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February--March 2010."},{"key":"e_1_3_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_2_129_1","volume-title":"Proceedings of the 27th USENIX Security Symposium","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . Foreshadow : Extracting the keys to the Intel SGX kingdom with transient out-of-order execution . In Proceedings of the 27th USENIX Security Symposium , Baltimore, MD , August 2018 . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, August 2018."},{"key":"e_1_3_2_2_130_1","volume-title":"Proceedings of the 41st IEEE Symposium on Security and Privacy","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck , Daniel Moghimi , Michael Schwarz , Moritz Lipp , Marina Minkin , Daniel Genkin , Yarom Yuval , Berk Sunar , Daniel Gruss , and Frank Piessens . LVI : Hijacking Transient Execution through Microarchitectural Load Value Injection . In Proceedings of the 41st IEEE Symposium on Security and Privacy , San Francisco, CA , May 2020 . Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yarom Yuval, Berk Sunar, Daniel Gruss, and Frank Piessens. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In Proceedings of the 41st IEEE Symposium on Security and Privacy, San Francisco, CA, May 2020."},{"key":"e_1_3_2_2_131_1","volume-title":"Proceedings of the 40th IEEE Symposium on Security and Privacy","author":"Schaik Stephan Van","year":"2019","unstructured":"Stephan Van Schaik , Alyssa Milburn , Sebastian \u00d6sterlund , Pietro Frigo , Giorgi Maisuradze , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . RIDL : Rogue in-flight data load . In Proceedings of the 40th IEEE Symposium on Security and Privacy , San Francisco, CA , May 2019 . Stephan Van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: Rogue in-flight data load. In Proceedings of the 40th IEEE Symposium on Security and Privacy, San Francisco, CA, May 2019."},{"key":"e_1_3_2_2_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00064"},{"key":"e_1_3_2_2_133_1","first-page":"299","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Wang Frank","year":"2017","unstructured":"Frank Wang , Catherine Yun , Shafi Goldwasser , Vinod Vaikuntanathan , and Matei Zaharia . Splinter : Practical private queries on public data . In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) , pages 299 -- 313 , Boston, MA , March 2017 . Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, and Matei Zaharia. Splinter: Practical private queries on public data. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI), pages 299--313, Boston, MA, March 2017."},{"key":"e_1_3_2_2_134_1","unstructured":"Xapian. Xapian. https:\/\/xapian.org\/.  Xapian. Xapian. https:\/\/xapian.org\/."},{"key":"e_1_3_2_2_135_1","first-page":"1253","volume-title":"Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR)","author":"Yang Peilin","year":"2017","unstructured":"Peilin Yang , Hui Fang , and Jimmy Lin . Anserini : Enabling the use of Lucene for information retrieval research . In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR) , pages 1253 -- 1256 , Tokyo, Japan , August 2017 . Peilin Yang, Hui Fang, and Jimmy Lin. Anserini: Enabling the use of Lucene for information retrieval research. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 1253--1256, Tokyo, Japan, August 2017."},{"key":"e_1_3_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"key":"e_1_3_2_2_137_1","volume-title":"Piano: Extremely simple, single-server PIR with sublinear server computation. Cryptology ePrint Archive","author":"Zhou Mingxun","year":"2023","unstructured":"Mingxun Zhou , Andrew Park , Elaine Shi , and Wenting Zheng . Piano: Extremely simple, single-server PIR with sublinear server computation. Cryptology ePrint Archive , 2023 . Mingxun Zhou, Andrew Park, Elaine Shi, and Wenting Zheng. Piano: Extremely simple, single-server PIR with sublinear server computation. Cryptology ePrint Archive, 2023."},{"key":"e_1_3_2_2_138_1","volume-title":"Bing delivers its largest improvement in search experience using Azure GPUs","author":"Zhu Jeffrey","year":"2019","unstructured":"Jeffrey Zhu . Bing delivers its largest improvement in search experience using Azure GPUs , 2019 . https:\/\/azure.microsoft.com\/en-us\/blog\/bing-delivers-its-largest-improvement-in-search-experience-using-azure-gpus\/. Jeffrey Zhu. Bing delivers its largest improvement in search experience using Azure GPUs, 2019. https:\/\/azure.microsoft.com\/en-us\/blog\/bing-delivers-its-largest-improvement-in-search-experience-using-azure-gpus\/."},{"key":"e_1_3_2_2_139_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0020"}],"event":{"name":"SOSP '23: 29th Symposium on Operating Systems Principles","location":"Koblenz Germany","acronym":"SOSP '23","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the 29th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613134","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3600006.3613134","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:49Z","timestamp":1750178209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":139,"alternative-id":["10.1145\/3600006.3613134","10.1145\/3600006"],"URL":"https:\/\/doi.org\/10.1145\/3600006.3613134","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]},"assertion":[{"value":"2023-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}