{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:50:48Z","timestamp":1773481848243,"version":"3.50.1"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"13","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:p>Most cloud service providers offer limited data privacy guarantees, discouraging clients from using them for managing their sensitive data. Cloud providers may use servers with Trusted Execution Environments (TEEs) to protect outsourced data, while supporting remote querying. However, TEEs may leak access patterns and allow communication volume attacks, enabling an honest-but-curious cloud provider to learn sensitive information. Oblivious algorithms can be used to completely hide data access patterns, but their high overhead could render them impractical. To alleviate the latter, the notion of Differential Obliviousness (DO) has been recently proposed. DO applies differential privacy (DP) on access patterns while hiding the communication volume of intermediate and final results; it does so by trading some level of privacy for efficiency.<\/jats:p>\n          <jats:p>\n            We present Doquet:\n            <jats:bold>D<\/jats:bold>\n            ifferentially\n            <jats:bold>O<\/jats:bold>\n            blivious Range and Join\n            <jats:bold>Que<\/jats:bold>\n            ries with Private Data Struc\n            <jats:bold>t<\/jats:bold>\n            ures, a framework for DO outsourced database systems. Doquet is the first approach that supports private data structures, indices, selection, foreign key join, many-to-many join, and their composition select-join in a\n            <jats:italic>realistic<\/jats:italic>\n            TEE setting, even when the accesses to the private memory can be eavesdropped on by the adversary. We prove that the algorithms in Doquet satisfy differential obliviousness. Furthermore, we implemented Doquet and tested it on a machine having a second generation of Intel SGX (TEE); the results show that Doquet offers up to an order of magnitude speedup in comparison with other fully oblivious and differentially oblivious approaches.\n          <\/jats:p>","DOI":"10.14778\/3625054.3625055","type":"journal-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:09:42Z","timestamp":1701709782000},"page":"4160-4173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Doquet: Differentially Oblivious Range and Join Queries with Private Data Structures"],"prefix":"10.14778","volume":"16","author":[{"given":"Lina","family":"Qiu","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Georgios","family":"Kellaris","sequence":"additional","affiliation":[{"name":"Lerna AI"}]},{"given":"Nikos","family":"Mamoulis","sequence":"additional","affiliation":[{"name":"University of Ioannina"}]},{"given":"Kobbi","family":"Nissim","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"George","family":"Kollios","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/800061.808726"},{"key":"e_1_2_1_2_1","volume-title":"Oblivious query processing. arXiv preprint arXiv:1312.4012","author":"Arasu Arvind","year":"2013","unstructured":"Arvind Arasu and Raghav Kaushik . 2013. Oblivious query processing. arXiv preprint arXiv:1312.4012 ( 2013 ). Arvind Arasu and Raghav Kaushik. 2013. Oblivious query processing. arXiv preprint arXiv:1312.4012 (2013)."},{"key":"e_1_2_1_3_1","volume-title":"Symposium on Simplicity in Algorithms. SIAM, 8--14","author":"Asharov Gilad","year":"2020","unstructured":"Gilad Asharov , TH Hubert Chan , Kartik Nayak , Rafael Pass , Ling Ren , and Elaine Shi . 2020 . Bucket oblivious sort: An extremely simple oblivious sort . In Symposium on Simplicity in Algorithms. SIAM, 8--14 . Gilad Asharov, TH Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. 2020. Bucket oblivious sort: An extremely simple oblivious sort. In Symposium on Simplicity in Algorithms. SIAM, 8--14."},{"key":"e_1_2_1_4_1","volume-title":"Oblivious parallel tight compaction. Cryptology ePrint Archive","author":"Asharov Gilad","year":"2020","unstructured":"Gilad Asharov , Ilan Komargodski , Wei-Kai Lin , Enoch Peserico , and Elaine Shi . 2020. Oblivious parallel tight compaction. Cryptology ePrint Archive ( 2020 ). Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, and Elaine Shi. 2020. Oblivious parallel tight compaction. Cryptology ePrint Archive (2020)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_2_1_7_1","unstructured":"Dmytro Bogatov. 2021. Epsolute. https:\/\/github.com\/epsolute\/epsolute  Dmytro Bogatov. 2021. Epsolute. https:\/\/github.com\/epsolute\/epsolute"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484786"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2840728.2840761"},{"key":"e_1_2_1_10_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software grand exposure:{SGX} cache attacks are practical . In 11th USENIX Workshop on Offensive Technologies (WOOT 17) . Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure:{SGX} cache attacks are practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.150"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Zhao Chang Dong Xie Sheng Wang and Feifei Li. 2022. Towards Practical Oblivious Join. (2022).  Zhao Chang Dong Xie Sheng Wang and Feifei Li. 2022. Towards Practical Oblivious Join. (2022).","DOI":"10.1145\/3514221.3517868"},{"key":"e_1_2_1_13_1","volume-title":"Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. In 2nd Conference on Information-Theoretic Cryptography (ITC","author":"Chu Shumo","year":"2021","unstructured":"Shumo Chu , Danyang Zhuo , Elaine Shi , and TH Chan . 2021 . Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik. Shumo Chu, Danyang Zhuo, Elaine Shi, and TH Chan. 2021. Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_2_1_14_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX explained. Cryptology ePrint Archive ( 2016 ). Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_2_1_15_1","volume-title":"Obladi: Oblivious serializable transactions in the cloud. In 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 727--743.","author":"Crooks Natacha","year":"2018","unstructured":"Natacha Crooks , Matthew Burke , Ethan Cecchetti , Sitar Harel , Rachit Agarwal , and Lorenzo Alvisi . 2018 . Obladi: Oblivious serializable transactions in the cloud. In 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 727--743. Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal, and Lorenzo Alvisi. 2018. Obladi: Oblivious serializable transactions in the cloud. In 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 727--743."},{"key":"e_1_2_1_16_1","volume-title":"Beng Chin Ooi, and Chunwang Zhang","author":"Anh Dinh Tien Tuan","year":"2015","unstructured":"Tien Tuan Anh Dinh , Prateek Saxena , Ee-Chien Chang , Beng Chin Ooi, and Chunwang Zhang . 2015 . M2r: Enabling stronger privacy in mapreduce computation. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 447--462. Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, and Chunwang Zhang. 2015. M2r: Enabling stronger privacy in mapreduce computation. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 447--462."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_18_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth etal 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.  Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends \u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the forty-sixth annual ACM symposium on Theory of computing. 684--693","author":"Goodrich Michael T","year":"2014","unstructured":"Michael T Goodrich . 2014 . Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in o (n log n) time . In Proceedings of the forty-sixth annual ACM symposium on Theory of computing. 684--693 . Michael T Goodrich. 2014. Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in o (n log n) time. In Proceedings of the forty-sixth annual ACM symposium on Theory of computing. 684--693."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 18th International Conference on Data Engineering","author":"Hacig\u00fcm\u00fcs Hakan","year":"2002","unstructured":"Hakan Hacig\u00fcm\u00fcs , Sharad Mehrotra , and Balakrishna R. Iyer . 2002. Providing Database as a Service . In Proceedings of the 18th International Conference on Data Engineering , San Jose, CA, USA, February 26 - March 1, 2002 , Rakesh Agrawal and Klaus R. Dittrich (Eds.). IEEE Computer Society, 29--38. Hakan Hacig\u00fcm\u00fcs, Sharad Mehrotra, and Balakrishna R. Iyer. 2002. Providing Database as a Service. In Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26 - March 1, 2002, Rakesh Agrawal and Klaus R. Dittrich (Eds.). IEEE Computer Society, 29--38."},{"key":"e_1_2_1_27_1","volume-title":"Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942","author":"Hay Michael","year":"2009","unstructured":"Michael Hay , Vibhor Rastogi , Gerome Miklau , and Dan Suciu . 2009. Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942 ( 2009 ). Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2009. Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942 (2009)."},{"key":"e_1_2_1_28_1","volume-title":"Proceedings on Privacy Enhancing Technologies 2019","author":"Hoang Thang","year":"2019","unstructured":"Thang Hoang , Muslum Ozgur Ozmen , Yeongjin Jang , and Attila A Yavuz . 2019 . Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset . Proceedings on Privacy Enhancing Technologies 2019 , 1 (2019). Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, and Attila A Yavuz. 2019. Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset. Proceedings on Privacy Enhancing Technologies 2019, 1 (2019)."},{"key":"e_1_2_1_29_1","volume-title":"3rd Gen Intel Xeon Scalable Processors Brief. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/processors\/xeon\/3rd-gen-xeon-scalable-processors-brief.html","unstructured":"Intel. 2021. 3rd Gen Intel Xeon Scalable Processors Brief. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/processors\/xeon\/3rd-gen-xeon-scalable-processors-brief.html Intel. 2021. 3rd Gen Intel Xeon Scalable Processors Brief. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/processors\/xeon\/3rd-gen-xeon-scalable-processors-brief.html"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_2_1_31_1","volume-title":"Accessing data while preserving privacy. CoRR, abs\/1706.01552 5","author":"Kellaris Georgios","year":"2017","unstructured":"Georgios Kellaris , George Kollios , Kobbi Nissim , and Adam O'Neill . 2017. Accessing data while preserving privacy. CoRR, abs\/1706.01552 5 ( 2017 ). Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. 2017. Accessing data while preserving privacy. CoRR, abs\/1706.01552 5 (2017)."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488337"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/TKDE.2018.2827378","article-title":"Engineering methods for differentially private histograms: Efficiency beyond utility","volume":"31","author":"Kellaris Georgios","year":"2018","unstructured":"Georgios Kellaris , Stavros Papadopoulos , and Dimitris Papadias . 2018 . Engineering methods for differentially private histograms: Efficiency beyond utility . IEEE Transactions on Knowledge and Data Engineering 31 , 2 (2018), 315 -- 328 . Georgios Kellaris, Stavros Papadopoulos, and Dimitris Papadias. 2018. Engineering methods for differentially private histograms: Efficiency beyond utility. IEEE Transactions on Knowledge and Data Engineering 31, 2 (2018), 315--328.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407814"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_18"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_2_1_38_1","volume-title":"A data-and workload-aware algorithm for range queries under differential privacy. arXiv preprint arXiv:1410.0265","author":"Li Chao","year":"2014","unstructured":"Chao Li , Michael Hay , Gerome Miklau , and Yue Wang . 2014. A data-and workload-aware algorithm for range queries under differential privacy. arXiv preprint arXiv:1410.0265 ( 2014 ). Chao Li, Michael Hay, Gerome Miklau, and Yue Wang. 2014. A data-and workload-aware algorithm for range queries under differential privacy. arXiv preprint arXiv:1410.0265 (2014)."},{"key":"e_1_2_1_39_1","volume-title":"USA","author":"Mironov Ilya","year":"2009","unstructured":"Ilya Mironov , Omkant Pandey , Omer Reingold , and Salil Vadhan . 2009 . Computational differential privacy. In Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA , USA , August 16-20, 2009. Proceedings. Springer, 126--142. Ilya Mironov, Omkant Pandey, Omer Reingold, and Salil Vadhan. 2009. Computational differential privacy. In Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings. Springer, 126--142."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556576"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574267"},{"key":"e_1_2_1_43_1","unstructured":"Lina Qiu. 2023. Doquet. https:\/\/github.com\/linaqiu22\/DOQP.git  Lina Qiu. 2023. Doquet. https:\/\/github.com\/linaqiu22\/DOQP.git"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409964.3461783"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Sajin Sasy Sergey Gorbunov and Christopher W Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX.. In NDSS.  Sajin Sasy Sergey Gorbunov and Christopher W Fletcher. 2018. ZeroTrace: Oblivious Memory Primitives from Intel SGX.. In NDSS.","DOI":"10.14722\/ndss.2018.23239"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2565--2579","author":"Sasy Sajin","year":"2022","unstructured":"Sajin Sasy , Aaron Johnson , and Ian Goldberg . 2022 . Fast Fully Oblivious Compaction and Shuffling . In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2565--2579 . Sajin Sasy, Aaron Johnson, and Ian Goldberg. 2022. Fast Fully Oblivious Compaction and Shuffling. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2565--2579."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_2_1_50_1","volume-title":"White Paper","author":"AMD","year":"2020","unstructured":"AMD SEV-SNP. 2020 . Strengthening VM isolation with integrity protection and more . White Paper , January (2020). AMD SEV-SNP. 2020. Strengthening VM isolation with integrity protection and more. White Paper, January (2020)."},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. USENIX Association, 1041--1056","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution . In Proceedings of the 26th USENIX Security Symposium. USENIX Association, 1041--1056 . Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution. In Proceedings of the 26th USENIX Security Symposium. USENIX Association, 1041--1056."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"e_1_2_1_53_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit.  Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"},{"key":"e_1_2_1_56_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez , and Ion Stoica . 2017 . Opaque: An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . 283--298. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). 283--298."},{"key":"e_1_2_1_57_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 3--34","author":"Zhou Mingxun","year":"2023","unstructured":"Mingxun Zhou , Elaine Shi , T-H Hubert Chan , and Shir Maimon . 2023 . A theory of composition for differential obliviousness . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 3--34 . Mingxun Zhou, Elaine Shi, T-H Hubert Chan, and Shir Maimon. 2023. A theory of composition for differential obliviousness. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 3--34."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3625054.3625055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:12:21Z","timestamp":1701709941000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3625054.3625055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":57,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.14778\/3625054.3625055"],"URL":"https:\/\/doi.org\/10.14778\/3625054.3625055","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"2023-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}