{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:11Z","timestamp":1766442731375,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","funder":[{"name":"NWO","award":["VI.Vidi.193.066"],"award-info":[{"award-number":["VI.Vidi.193.066"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765038","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"1754-1768","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7674-2102","authenticated-orcid":false,"given":"Daniel","family":"P\u00f6llmann","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-6709","authenticated-orcid":false,"given":"Tianxin","family":"Tang","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_14"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484786"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0127"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.45"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555984"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.150"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789811232701_0003"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560610"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24423"},{"key":"e_1_3_2_2_19_1","volume-title":"SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In USENIX Security 2020: 29th USENIX Security Symposium","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020b. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In USENIX Security 2020: 29th USENIX Security Symposium, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 2433-2450."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0028"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_6"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.10"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179460"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0032"},{"key":"e_1_3_2_2_30_1","volume-title":"Tran Khanh Dang, and Nguyen Thi Huyen Trang","author":"Ha Trung","year":"2023","unstructured":"Trung Ha, Trang Vo, Tran Khanh Dang, and Nguyen Thi Huyen Trang. 2023. Differential Privacy under Membership Inference Attacks. In Future Data and Security Engineering. Big, Data, Security and Privacy, Smart City and Industry 4.0 Applications, Tran Khanh Dang, Josef K\u00fcng, and Tai M. Chung (Eds.). Springer Nature Singapore, Singapore, 255-269."},{"key":"e_1_3_2_2_31_1","volume-title":"Attack and Mitigation. In ISOC Network and Distributed System Security Symposium - NDSS","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In ISOC Network and Distributed System Security Symposium - NDSS 2012. The Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00014"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_7"},{"key":"e_1_3_2_2_34_1","unstructured":"Seny Kamara and Tarik Moataz. 2023. Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search. Cryptology ePrint Archive Report 2023\/813. https:\/\/eprint.iacr.org\/2023\/813"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560593"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00044"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_18"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616607"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02641-7_3"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484552"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670313"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"volume-title":"USENIX Security 2021: 30th USENIX Security Symposium","author":"Oya Simon","key":"e_1_3_2_2_49_1","unstructured":"Simon Oya and Florian Kerschbaum. 2021. Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. In USENIX Security 2021: 30th USENIX Security Symposium, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 127-142."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354213"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23116"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_14"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30545-0_17"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00030"},{"key":"e_1_3_2_2_55_1","volume-title":"Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost Cryptology ePrint Archive","author":"P\u00f6llmann Daniel","year":"2025","unstructured":"Daniel P\u00f6llmann and Tianxin Tang. 2025. Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost Cryptology ePrint Archive (2025)."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978401"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574267"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.14778\/3625054.3625055"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3657005"},{"key":"e_1_3_2_2_60_1","volume-title":"Constants Count: Practical Improvements to Oblivious RAM. In USENIX Security 2015: 24th USENIX Security Symposium","author":"Ren Ling","year":"2015","unstructured":"Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM. In USENIX Security 2015: 24th USENIX Security Symposium, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, Washington, DC, USA, 415-430."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23041"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0032"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623085"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.14778\/3675034.3675038"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30620-4_1"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2024.103"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:28:54Z","timestamp":1766442534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":69,"alternative-id":["10.1145\/3719027.3765038","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765038","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}