{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:53:17Z","timestamp":1773157997718,"version":"3.50.1"},"reference-count":80,"publisher":"Association for Computing Machinery (ACM)","issue":"8","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p>\n            In this work, we propose Longshot, a novel design for secure outsourced database systems that supports ad-hoc queries through the use of secure multi-party computation and differential privacy. By combining these two techniques, we build and maintain data structures (i.e., synopses, indexes, and stores) that improve query execution efficiency while maintaining strong privacy and security guarantees. As new data records are uploaded by data owners, these data structures are continually updated by Longshot using novel algorithms that leverage bounded information leakage to minimize the use of expensive cryptographic protocols. Furthermore, Long-shot organizes the data structures as a hierarchical tree based on when the update occurred, allowing for update strategies that provide logarithmic error over time. Through this approach, Longshot introduces a tunable three-way trade-off between privacy, accuracy, and efficiency. Our experimental results confirm that our optimizations are not only asymptotic improvements but also observable in practice. In particular, we see a 5x efficiency improvement to update our data structures even when the number of updates is less than 200. Moreover, the data structures significantly improve query runtimes over time, about ~10\n            <jats:sup>3<\/jats:sup>\n            x faster compared to the baseline after 20 updates.\n          <\/jats:p>","DOI":"10.14778\/3594512.3594529","type":"journal-article","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:28:36Z","timestamp":1687480116000},"page":"2005-2018","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Longshot: Indexing Growing Databases Using MPC and Differential Privacy"],"prefix":"10.14778","volume":"16","author":[{"given":"Yanping","family":"Zhang","sequence":"first","affiliation":[{"name":"Duke University"}]},{"given":"Johes","family":"Bater","sequence":"additional","affiliation":[{"name":"Tufts Univeresity"}]},{"given":"Kartik","family":"Nayak","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University"}]}],"member":"320","published-online":{"date-parts":[[2023,6,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2022. Emp-toolkit. https:\/\/github.com\/emp-toolkit.  2022. Emp-toolkit. https:\/\/github.com\/emp-toolkit."},{"key":"e_1_2_1_2_1","unstructured":"2022. TLC Trip Record Data. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page.  2022. TLC Trip Record Data. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0042"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312496"},{"key":"e_1_2_1_6_1","volume-title":"SMCQL: secure querying for federated databases. arXiv preprint arXiv:1606.06808","author":"Bater Johes","year":"2016","unstructured":"Johes Bater , Gregory Elliott , Craig Eggen , Satyender Goel , Abel Kho , and Jennie Rogers . 2016. SMCQL: secure querying for federated databases. arXiv preprint arXiv:1606.06808 ( 2016 ). Johes Bater, Gregory Elliott, Craig Eggen, Satyender Goel, Abel Kho, and Jennie Rogers. 2016. SMCQL: secure querying for federated databases. arXiv preprint arXiv:1606.06808 (2016)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407854"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"e_1_2_1_11_1","volume-title":"The tao of inference in privacy-protected databases. Cryptology ePrint Archive","author":"Bindschaedler Vincent","year":"2017","unstructured":"Vincent Bindschaedler , Paul Grubbs , David Cash , Thomas Ristenpart , and Vitaly Shmatikov . 2017. The tao of inference in privacy-protected databases. Cryptology ePrint Archive ( 2017 ). Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2017. The tao of inference in privacy-protected databases. Cryptology ePrint Archive (2017)."},{"key":"e_1_2_1_12_1","first-page":"1175","article-title":"Revisiting Leakage Abuse Attacks","volume":"2019","author":"Blackstone Laura","year":"2019","unstructured":"Laura Blackstone , Seny Kamara , and Tarik Moataz . 2019 . Revisiting Leakage Abuse Attacks . IACR Cryptol. ePrint Arch. 2019 (2019), 1175 . Laura Blackstone, Seny Kamara, and Tarik Moataz. 2019. Revisiting Leakage Abuse Attacks. IACR Cryptol. ePrint Arch. 2019 (2019), 1175.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_13_1","volume-title":"Efficiently Querying Databases While Providing Differential Privacy. arXiv preprint arXiv:1706.01552","author":"Bogatov Dmytro","year":"2021","unstructured":"Dmytro Bogatov , Georgios Kellaris , George Kollios , Kobbi Nissim , and Adam O'Neill . 2021. \u03b5psolute : Efficiently Querying Databases While Providing Differential Privacy. arXiv preprint arXiv:1706.01552 ( 2021 ). Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2021. \u03b5psolute : Efficiently Querying Databases While Providing Differential Privacy. arXiv preprint arXiv:1706.01552 (2021)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_2_1_16_1","volume-title":"Theory of cryptography conference","author":"Boneh Dan","unstructured":"Dan Boneh , Eu-Jin Goh , and Kobbi Nissim . 2005. Evaluating 2-DNF formulas on ciphertexts . In Theory of cryptography conference . Springer , 325--341. Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. 2005. Evaluating 2-DNF formulas on ciphertexts. In Theory of cryptography conference. Springer, 325--341."},{"key":"e_1_2_1_17_1","volume-title":"Quantifying differential privacy in continuous data release under temporal correlations","author":"Cao Yang","year":"2018","unstructured":"Yang Cao , Masatoshi Yoshikawa , Yonghui Xiao , and Li Xiong . 2018. Quantifying differential privacy in continuous data release under temporal correlations . IEEE transactions on knowledge and data engineering 31, 7 ( 2018 ), 1281--1295. Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, and Li Xiong. 2018. Quantifying differential privacy in continuous data release under temporal correlations. IEEE transactions on knowledge and data engineering 31, 7 (2018), 1281--1295."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"e_1_2_1_21_1","volume-title":"Cryptepsilon: Crypto-Assisted Differential Privacy on Untrusted Servers. arXiv preprint arXiv:1902.07756","author":"Chowdhury Amrita Roy","year":"2019","unstructured":"Amrita Roy Chowdhury , Chenghong Wang , Xi He , Ashwin Machanavajjhala , and Somesh Jha . 2019 . Cryptepsilon: Crypto-Assisted Differential Privacy on Untrusted Servers. arXiv preprint arXiv:1902.07756 (2019). Amrita Roy Chowdhury, Chenghong Wang, Xi He, Ashwin Machanavajjhala, and Somesh Jha. 2019. Cryptepsilon: Crypto-Assisted Differential Privacy on Untrusted Servers. arXiv preprint arXiv:1902.07756 (2019)."},{"key":"e_1_2_1_22_1","volume-title":"Prio: Private, Robust, and Scalable Computation of Aggregate Statistics.. In NSDI. 259--282.","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh . 2017 . Prio: Private, Robust, and Scalable Computation of Aggregate Statistics.. In NSDI. 259--282. Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics.. In NSDI. 259--282."},{"key":"e_1_2_1_23_1","volume-title":"Obladi: Oblivious Serializable Transactions in the Cloud. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Crooks Natacha","year":"2018","unstructured":"Natacha Crooks , Matthew Burke , Ethan Cecchetti , Sitar Harel , Rachit Agarwal , and Lorenzo Alvisi . 2018 . Obladi: Oblivious Serializable Transactions in the Cloud. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . USENIX Association, Carlsbad, CA, 727--743. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/crooks Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal, and Lorenzo Alvisi. 2018. Obladi: Oblivious Serializable Transactions in the Cloud. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 727--743. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/crooks"},{"key":"e_1_2_1_24_1","volume-title":"Differential privacy for growing databases. arXiv preprint arXiv:1803.06416","author":"Cummings Rachel","year":"2018","unstructured":"Rachel Cummings , Sara Krehbiel , Kevin A Lai , and Uthaipon Tantipongpipat . 2018. Differential privacy for growing databases. arXiv preprint arXiv:1803.06416 ( 2018 ). Rachel Cummings, Sara Krehbiel, Kevin A Lai, and Uthaipon Tantipongpipat. 2018. Differential privacy for growing databases. arXiv preprint arXiv:1803.06416 (2018)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452397"},{"key":"e_1_2_1_27_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20).","author":"Demertzis Ioannis","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou , and Saurabh Shintre . 2020. {SEAL} : Attack Mitigation for Encrypted Databases via Adjustable Leakage . In 29th {USENIX} Security Symposium ({USENIX} Security 20). Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020. {SEAL}: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In 29th {USENIX} Security Symposium ({USENIX} Security 20)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Irit Dinur and Kobbi Nissim. 2003. Revealing information while preserving privacy. PODS.  Irit Dinur and Kobbi Nissim. 2003. Revealing information while preserving privacy. PODS.","DOI":"10.1145\/773153.773173"},{"key":"e_1_2_1_29_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_2_1_31_1","volume-title":"Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458","author":"Eskandarian Saba","year":"2017","unstructured":"Saba Eskandarian and Matei Zaharia . 2017 . Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458 (2017). Saba Eskandarian and Matei Zaharia. 2017. Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458 (2017)."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"e_1_2_1_38_1","volume-title":"Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942","author":"Hay Michael","year":"2009","unstructured":"Michael Hay , Vibhor Rastogi , Gerome Miklau , and Dan Suciu . 2009. Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942 ( 2009 ). Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2009. Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942 (2009)."},{"key":"e_1_2_1_39_1","volume-title":"Ndss","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access pattern disclosure on searchable encryption: ramification, attack and mitigation .. In Ndss , Vol. 20 . Citeseer, 12. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: ramification, attack and mitigation.. In Ndss, Vol. 20. Citeseer, 12."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557561"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_2_1_43_1","volume-title":"Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552","author":"Kellaris Georgios","year":"2017","unstructured":"Georgios Kellaris , George Kollios , Kobbi Nissim , and Adam O'Neill . 2017. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552 ( 2017 ). Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2017. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552 (2017)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359639"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783366"},{"key":"e_1_2_1_50_1","unstructured":"Chao Li Gerome Miklau Michael Hay Andrew McGregor and Vibhor Rastogi. 2015. The matrix mechanism: optimizing linear counting queries under differential privacy. VLDB.  Chao Li Gerome Miklau Michael Hay Andrew McGregor and Vibhor Rastogi. 2015. The matrix mechanism: optimizing linear counting queries under differential privacy. VLDB."},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 24th ACM international on conference on information and knowledge management. 1001--1010","author":"Li Haoran","year":"2015","unstructured":"Haoran Li , Li Xiong , Xiaoqian Jiang , and Jinfei Liu . 2015 . Differentially private histogram publication for dynamic datasets: an adaptive sampling approach . In Proceedings of the 24th ACM international on conference on information and knowledge management. 1001--1010 . Haoran Li, Li Xiong, Xiaoqian Jiang, and Jinfei Liu. 2015. Differentially private histogram publication for dynamic datasets: an adaptive sampling approach. In Proceedings of the 24th ACM international on conference on information and knowledge management. 1001--1010."},{"key":"e_1_2_1_52_1","unstructured":"Yanbin Lu. 2012. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.. In NDSS.  Yanbin Lu. 2012. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.. In NDSS."},{"key":"e_1_2_1_53_1","volume-title":"15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21). 55--74.","author":"Luo Tao","unstructured":"Tao Luo , Mingen Pan , Pierre Tholoniat , Asaf Cidon , Roxana Geambasu , and Mathias L\u00e9cuyer . 2021. Privacy Budget Scheduling . In 15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21). 55--74. Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, and Mathias L\u00e9cuyer. 2021. Privacy Budget Scheduling. In 15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21). 55--74."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243851"},{"key":"e_1_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Ryan McKenna Gerome Miklau Michael Hay and Ashwin Machanavajjhala. 2018. Optimizing error of high-dimensional statistical queries under differential privacy. VLDB.  Ryan McKenna Gerome Miklau Michael Hay and Ashwin Machanavajjhala. 2018. Optimizing error of high-dimensional statistical queries under differential privacy. VLDB.","DOI":"10.14778\/3231751.3231769"},{"key":"e_1_2_1_56_1","volume-title":"Winning the NIST Contest: A scalable and general approach to differentially private synthetic data. arXiv preprint arXiv:2108.04978","author":"McKenna Ryan","year":"2021","unstructured":"Ryan McKenna , Gerome Miklau , and Daniel Sheldon . 2021. Winning the NIST Contest: A scalable and general approach to differentially private synthetic data. arXiv preprint arXiv:2108.04978 ( 2021 ). Ryan McKenna, Gerome Miklau, and Daniel Sheldon. 2021. Winning the NIST Contest: A scalable and general approach to differentially private synthetic data. arXiv preprint arXiv:2108.04978 (2021)."},{"key":"e_1_2_1_57_1","volume-title":"International Conference on Machine Learning. PMLR, 4435--4444","author":"McKenna Ryan","year":"2019","unstructured":"Ryan McKenna , Daniel Sheldon , and Gerome Miklau . 2019 . Graphical-model based estimation and inference for differential privacy . In International Conference on Machine Learning. PMLR, 4435--4444 . Ryan McKenna, Daniel Sheldon, and Gerome Miklau. 2019. Graphical-model based estimation and inference for differential privacy. In International Conference on Machine Learning. PMLR, 4435--4444."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_2_1_60_1","volume-title":"2015 IEEE Symposium on Security and Privacy. IEEE, 377--394","author":"Nayak Kartik","year":"2015","unstructured":"Kartik Nayak , Xiao Shaun Wang , Stratis Ioannidis , Udi Weinsberg , Nina Taft , and Elaine Shi . 2015 . Graphsc: Parallel secure computation made easy . In 2015 IEEE Symposium on Security and Privacy. IEEE, 377--394 . Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, and Elaine Shi. 2015. Graphsc: Parallel secure computation made easy. In 2015 IEEE Symposium on Security and Privacy. IEEE, 377--394."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354213"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556576"},{"key":"e_1_2_1_64_1","unstructured":"Paul Grubbs Tom Ristenpart and Vitaly Shmatikov. [n.d.]. Why Your Encrypted Database Is Not Secure. ([n. d.]).  Paul Grubbs Tom Ristenpart and Vitaly Shmatikov. [n.d.]. Why Your Encrypted Database Is Not Secure. ([n. d.])."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_23"},{"key":"e_1_2_1_66_1","volume-title":"Obfuscated Access and Search Patterns in Searchable Encryption. arXiv preprint arXiv:2102.09651","author":"Shang Zhiwei","year":"2021","unstructured":"Zhiwei Shang , Simon Oya , Andreas Peter , and Florian Kerschbaum . 2021. Obfuscated Access and Search Patterns in Searchable Encryption. arXiv preprint arXiv:2102.09651 ( 2021 ). Zhiwei Shang, Simon Oya, Andreas Peter, and Florian Kerschbaum. 2021. Obfuscated Access and Search Patterns in Searchable Encryption. arXiv preprint arXiv:2102.09651 (2021)."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_2_1_70_1","first-page":"72","article-title":"Practical Dynamic Searchable Encryption with Small Leakage","volume":"71","author":"Stefanov Emil","year":"2014","unstructured":"Emil Stefanov , Charalampos Papamanthou , and Elaine Shi . 2014 . Practical Dynamic Searchable Encryption with Small Leakage .. In NDSS , Vol. 71. 72 -- 75 . Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage.. In NDSS, Vol. 71. 72--75.","journal-title":"NDSS"},{"key":"e_1_2_1_71_1","volume-title":"CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949","author":"Tan Sijun","year":"2021","unstructured":"Sijun Tan , Brian Knott , Yuan Tian , and David J Wu . 2021 . CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949 (2021). Sijun Tan, Brian Knott, Yuan Tian, and David J Wu. 2021. CRYPTGPU: Fast Privacy-Preserving Machine Learning on the GPU. arXiv preprint arXiv:2104.10949 (2021)."},{"key":"e_1_2_1_72_1","volume-title":"Benchmarking differentially private synthetic data generation algorithms. arXiv preprint arXiv:2112.09238","author":"Tao Yuchao","year":"2021","unstructured":"Yuchao Tao , Ryan McKenna , Michael Hay , Ashwin Machanavajjhala , and Gerome Miklau . 2021. Benchmarking differentially private synthetic data generation algorithms. arXiv preprint arXiv:2112.09238 ( 2021 ). Yuchao Tao, Ryan McKenna, Michael Hay, Ashwin Machanavajjhala, and Gerome Miklau. 2021. Benchmarking differentially private synthetic data generation algorithms. arXiv preprint arXiv:2112.09238 (2021)."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0052"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0032"},{"key":"e_1_2_1_75_1","volume-title":"DP-Sync: Hiding Update Patterns in Secure OutsourcedDatabases with Differential Privacy. arXiv preprint arXiv:2103.15942","author":"Wang Chenghong","year":"2021","unstructured":"Chenghong Wang , Johes Bater , Kartik Nayak , and Ashwin Machanavajjhala . 2021. DP-Sync: Hiding Update Patterns in Secure OutsourcedDatabases with Differential Privacy. arXiv preprint arXiv:2103.15942 ( 2021 ). Chenghong Wang, Johes Bater, Kartik Nayak, and Ashwin Machanavajjhala. 2021. DP-Sync: Hiding Update Patterns in Secure OutsourcedDatabases with Differential Privacy. arXiv preprint arXiv:2103.15942 (2021)."},{"key":"e_1_2_1_76_1","unstructured":"Chenghong Wang Johes Bater Kartik Nayak and Ashwin Machanavajjhala. 2022. IncShrink: architecting efficient outsourced databases using incremental mpc and differential privacy. SIGMOD.  Chenghong Wang Johes Bater Kartik Nayak and Ashwin Machanavajjhala. 2022. IncShrink: architecting efficient outsourced databases using incremental mpc and differential privacy. SIGMOD."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_6"},{"key":"e_1_2_1_78_1","volume-title":"Hermetic: Privacy-preserving distributed analytics without (most) side channels. External Links: Link Cited by","author":"Xu Min","year":"2019","unstructured":"Min Xu , Antonis Papadimitriou , Andreas Haeberlen , and Ariel Feldman . 2019 . Hermetic: Privacy-preserving distributed analytics without (most) side channels. External Links: Link Cited by (2019). Min Xu, Antonis Papadimitriou, Andreas Haeberlen, and Ariel Feldman. 2019. Hermetic: Privacy-preserving distributed analytics without (most) side channels. External Links: Link Cited by (2019)."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"e_1_2_1_80_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 707--720.","author":"Zhang Yupeng","unstructured":"Yupeng Zhang , Jonathan Katz , and Charalampos Papamanthou . 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption . In 25th {USENIX} Security Symposium ({USENIX} Security 16). 707--720. Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 707--720."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3594512.3594529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:36:54Z","timestamp":1687480614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3594512.3594529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":80,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.14778\/3594512.3594529"],"URL":"https:\/\/doi.org\/10.14778\/3594512.3594529","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"2023-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}