{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:09:57Z","timestamp":1767182997071,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation, Singapore"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072132","62261160651","62302118"],"award-info":[{"award-number":["62072132","62261160651","62302118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637674","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1724-1738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["DISCO: Dynamic Searchable Encryption with Constant State"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9927-0534","authenticated-orcid":false,"given":"Xiangfu","family":"Song","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5816-4126","authenticated-orcid":false,"given":"Yu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6468-629X","authenticated-orcid":false,"given":"Jianli","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8625-0275","authenticated-orcid":false,"given":"Changyu","family":"Dong","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2984-2661","authenticated-orcid":false,"given":"Zheli","family":"Liu","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4613-0866","authenticated-orcid":false,"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 1143--1154","author":"Bost Raphael","year":"2016","unstructured":"Raphael Bost. 2016. \u03a3o\u03c6o\u03c2: Forward secure searchable encryption. In ACM SIGSAC Conference on Computer and Communications Security. 1143--1154."},{"key":"e_1_3_2_1_2_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 1465--1482","author":"Bost Rapha\u00ebl","year":"2017","unstructured":"Rapha\u00ebl Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and backward private searchable encryption from constrained cryptographic primitives. In ACM SIGSAC Conference on Computer and Communications Security. 1465--1482."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI). 835--850","author":"Burkhalter Lukas","year":"2020","unstructured":"Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, and Sylvia Ratnasamy. 2020. {TimeCrypt}: Encrypted data stream processing at scale with cryptographic access control. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). 835--850."},{"key":"e_1_3_2_1_4_1","volume-title":"Network and Distributed System Security Symposium","author":"Cash David","year":"2014","unstructured":"David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2014. Dynamic searchable encryption in very-large databases: Data structures and implementation. Network and Distributed System Security Symposium (2014)."},{"key":"e_1_3_2_1_5_1","volume-title":"Annual Cryptology Conference. 353--373","author":"Cash David","year":"2013","unstructured":"David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cuatualin Rocsu, and Michael Steiner. 2013. Highly-scalable searchable symmetric encryption with support for boolean queries. In Annual Cryptology Conference. 353--373."},{"key":"e_1_3_2_1_6_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. 351--368","author":"Cash David","year":"2014","unstructured":"David Cash and Stefano Tessaro. 2014. The locality of searchable symmetric encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 351--368."},{"key":"e_1_3_2_1_7_1","unstructured":"Javad Ghareh Chamani Dimitrios Papadopoulos Mohammadamin Karbasforushan and Ioannis Demertzis. 2022. Dynamic searchable encryption with optimal search in the presence of deletions. In USENIX Security. 2425--2442."},{"key":"e_1_3_2_1_8_1","first-page":"26","article-title":"Bestie: Very practical searchable encryption with forward and backward security. In European Symposium on Research in Computer Security","author":"Chen Tianyang","year":"2021","unstructured":"Tianyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin. 2021. Bestie: Very practical searchable encryption with forward and backward security. In European Symposium on Research in Computer Security, Part II 26. 3--23.","journal-title":"Part"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446920"},{"key":"e_1_3_2_1_10_1","volume-title":"ACM conference on Computer and communications security. 79--88","author":"Curtmola Reza","year":"2006","unstructured":"Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. 2006. Searchable symmetric encryption: improved definitions and efficient constructions. In ACM conference on Computer and communications security. 79--88."},{"key":"e_1_3_2_1_11_1","volume-title":"Dynamic Searchable Encryption with Small Client Storage. In Annual Network and Distributed System Security Symposium.","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2020. Dynamic Searchable Encryption with Small Client Storage. In Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1515\/popets-2018-0002","article-title":"Efficient Dynamic Searchable Encryption with Forward Privacy","volume":"1","author":"Etemad Mohammad","year":"2018","unstructured":"Mohammad Etemad, Alptekin K\u00fcp\u00e7\u00fc, Charalampos Papamanthou, and David Evans. 2018. Efficient Dynamic Searchable Encryption with Forward Privacy. Privacy Enhancing Technologies 1 (2018), 5--20.","journal-title":"Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_13_1","volume-title":"Annual International Cryptology Conference. 563--592","author":"Garg Sanjam","year":"2016","unstructured":"Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption. In Annual International Cryptology Conference. 563--592."},{"key":"e_1_3_2_1_14_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 1038--1055","author":"Chamani Javad Ghareh","year":"2018","unstructured":"Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New constructions for forward and backward private symmetric searchable encryption. In ACM SIGSAC Conference on Computer and Communications Security. 1038--1055."},{"key":"e_1_3_2_1_15_1","volume-title":"ACM symposium on Theory of computing. 182--194","author":"Goldreich Oded","year":"1987","unstructured":"Oded Goldreich. 1987. Towards a theory of software protection and simulation by oblivious RAMs. In ACM symposium on Theory of computing. 182--194."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_17_1","first-page":"1538","article-title":"Secure dynamic searchable symmetric encryption with constant client storage cost","volume":"16","author":"He Kun","year":"2020","unstructured":"Kun He, Jing Chen, Qinxi Zhou, Ruiying Du, and Yang Xiang. 2020. Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Transactions on Information Forensics and Security 16 (2020), 1538--1549.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_18_1","volume-title":"Annual International Cryptology Conference, Part I 38","author":"Kamara Seny","year":"2018","unstructured":"Seny Kamara, Tarik Moataz, and Olya Ohrimenko. 2018. Structured encryption and leakage suppression. In Annual International Cryptology Conference, Part I 38. 339--370."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Seny Kamara and Charalampos Papamanthou. 2013. Parallel and dynamic searchable symmetric encryption. In FC.","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"e_1_3_2_1_20_1","volume-title":"ACM conference on Computer and communications security. 965--976","author":"Kamara Seny","year":"2012","unstructured":"Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In ACM conference on Computer and communications security. 965--976."},{"key":"e_1_3_2_1_21_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 1449--1463","author":"Kim Kee Sung","year":"2017","unstructured":"Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. 2017. Forward secure dynamic searchable symmetric encryption with efficient updates. In ACM SIGSAC Conference on Computer and Communications Security. 1449--1463."},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Applied Cryptography and Network Security. 478--497","author":"Lai Russell WF","year":"2017","unstructured":"Russell WF Lai and Sherman SM Chow. 2017. Forward-secure searchable encryption on labeled bipartite graphs. In International Conference on Applied Cryptography and Network Security. 478--497."},{"key":"e_1_3_2_1_23_1","volume-title":"Beyond","volume":"146","author":"Li Feng","year":"2023","unstructured":"Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, and Xiangfu Song. 2023. Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. In European Symposium on Research in Computer Security. Springer, 126--146."},{"key":"e_1_3_2_1_24_1","first-page":"2023","article-title":"Eurus: towards an efficient searchable symmetric encryption with size pattern protection","volume":"19","author":"Liu Zheli","year":"2020","unstructured":"Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong. 2020. Eurus: towards an efficient searchable symmetric encryption with size pattern protection. IEEE Transactions on Dependable and Secure Computing 19, 3 (2020), 2023--2037.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_25_1","volume-title":"IEEE symposium on security and privacy. S&P","author":"Song Dawn Xiaoding","year":"2000","unstructured":"Dawn Xiaoding Song, David Wagner, and Adrian Perrig. 2000. Practical techniques for searches on encrypted data. In IEEE symposium on security and privacy. S&P 2000. 44--55."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2822294"},{"key":"e_1_3_2_1_27_1","volume-title":"Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers. In International Conference on Database Systems for Advanced Applications. Springer, 157--177","author":"Song Xiangfu","year":"2020","unstructured":"Xiangfu Song, Dong Yin, Han Jiang, and Qiuliang Xu. 2020. Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers. In International Conference on Database Systems for Advanced Applications. Springer, 157--177."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Emil Stefanov Charalampos Papamanthou and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage.. In NDSS.","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_1_30_1","volume-title":"Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Network and Distributed System Security Symposium.","author":"Sun Shi-Feng","year":"2021","unstructured":"Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K Liu, Surya Nepal, and Dawu Gu. 2021. Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_31_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 763--780","author":"Sun Shi-Feng","year":"2018","unstructured":"Shi-Feng Sun, Xingliang Yuan, Joseph K Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical backward-secure searchable encryption from symmetric puncturable encryption. In ACM SIGSAC Conference on Computer and Communications Security. 763--780."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.2478\/popets-2022-0003","article-title":"Forward and Backward-Secure Range-Searchable Symmetric Encryption","volume":"1","author":"Wang Jiafan","year":"2022","unstructured":"Jiafan Wang and Sherman SM Chow. 2022. Forward and Backward-Secure Range-Searchable Symmetric Encryption. Privacy Enhancing Technologies 1 (2022), 28--48.","journal-title":"Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_33_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 215--226","author":"Wang Xiao Shaun","year":"2014","unstructured":"Xiao Shaun Wang, Kartik Nayak, Chang Liu, TH Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. 2014. Oblivious data structures. In ACM SIGSAC Conference on Computer and Communications Security. 215--226."},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium (USENIX Security). 707--720","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption. In USENIX Security Symposium (USENIX Security). 707--720."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Yu Zheng Heng Tian Minxin Du and Chong Fu. 2022. Encrypted video search: Scalable modular and content-similar. In ACM Multimedia systems Conference. 177--190.","DOI":"10.1145\/3524273.3528190"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637674","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":35,"alternative-id":["10.1145\/3634737.3637674","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637674","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}