{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T09:33:20Z","timestamp":1769074400213,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB3106000"],"award-info":[{"award-number":["2023YFB3106000"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Distinguished Youth Project","award":["2022JC-47"],"award-info":[{"award-number":["2022JC-47"]}]},{"name":"National Natural Science Foundation of China","award":["62272294, 62072357, 62102313, and 61960206014"],"award-info":[{"award-number":["62272294, 62072357, 62102313, and 61960206014"]}]},{"name":"Young Talent Fund of Association for Science and Technology in Shaanxi","award":["20230117"],"award-info":[{"award-number":["20230117"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670355","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4658-4672","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-6561-2540","authenticated-orcid":false,"given":"Yunling","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, Xi'an, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3742-5275","authenticated-orcid":false,"given":"Shi-Feng","family":"Sun","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University &amp; Blockchain Advanced Research Center, Shanghai, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-5297-0293","authenticated-orcid":false,"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-5858-5070","authenticated-orcid":false,"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-6656-6240","authenticated-orcid":false,"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-0504-9538","authenticated-orcid":false,"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University &amp; Blockchain Advanced Research Center, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Injection-Secure Structured and Searchable Symmetric Encryption. In ASIACRYPT 2023 (LNCS)","volume":"14443","author":"Amjad Ghous","year":"2023","unstructured":"Ghous Amjad, Seny Kamara, and Tarik Moataz. 2023. Injection-Secure Structured and Searchable Symmetric Encryption. In ASIACRYPT 2023 (LNCS), Vol. 14443. 232--262."},{"key":"e_1_3_2_1_2_1","volume-title":"Revisiting Leakage Abuse Attacks. In NDSS","author":"Blackstone Laura","year":"2020","unstructured":"Laura Blackstone, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In NDSS 2020."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_4_1","volume-title":"SSE and SSD: Page-Efficient Searchable Symmetric Encryption. In CRYPTO 2021 (LNCS)","volume":"12827","author":"Bossuat Ang\u00e8le","year":"2021","unstructured":"Ang\u00e8le Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, and Michael Reichle. 2021. SSE and SSD: Page-Efficient Searchable Symmetric Encryption. In CRYPTO 2021 (LNCS), Vol. 12827. 157--184."},{"key":"e_1_3_2_1_5_1","volume-title":"CCS","author":"Bost Rapha\u00ebl","year":"2017","unstructured":"Rapha\u00ebl Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. In CCS 2017. 1465--1482."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73951-7_13"},{"key":"e_1_3_2_1_7_1","volume-title":"Leakage-Abuse Attacks Against Searchable Encryption. In CCS","author":"Cash David","year":"2015","unstructured":"David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-Abuse Attacks Against Searchable Encryption. In CCS 2015. 668--679."},{"key":"e_1_3_2_1_8_1","volume-title":"Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO 2013 (LNCS)","volume":"8042","author":"Cash David","year":"2013","unstructured":"David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2013. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In CRYPTO 2013 (LNCS), Vol. 8042. 353--373."},{"key":"e_1_3_2_1_9_1","volume-title":"The Locality of Searchable Symmetric Encryption. In EUROCRYPT 2014 (LNCS)","volume":"8441","author":"Cash David","year":"2014","unstructured":"David Cash and Stefano Tessaro. 2014. The Locality of Searchable Symmetric Encryption. In EUROCRYPT 2014 (LNCS), Vol. 8441. 351--368."},{"key":"e_1_3_2_1_10_1","volume-title":"Structured Encryption and Controlled Disclosure. In ASIACRYPT 2010 (LNCS)","volume":"6477","author":"Chase Melissa","year":"2010","unstructured":"Melissa Chase and Seny Kamara. 2010. Structured Encryption and Controlled Disclosure. In ASIACRYPT 2010 (LNCS), Vol. 6477. 577--594."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_12_1","volume-title":"Dynamic Searchable Encryption with Small Client Storage. In NDSS","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2020. Dynamic Searchable Encryption with Small Client Storage. In NDSS 2020."},{"key":"e_1_3_2_1_13_1","volume-title":"Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency. In CRYPTO 2018 (LNCS)","volume":"10991","author":"Demertzis Ioannis","year":"2018","unstructured":"Ioannis Demertzis, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2018. Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency. In CRYPTO 2018 (LNCS), Vol. 10991. 371--406."},{"key":"e_1_3_2_1_14_1","volume-title":"Rich Queries on Encrypted Data: Beyond Exact Matches. In ESORICS 2015 (LNCS)","volume":"9327","author":"Faber Sky","year":"2015","unstructured":"Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, and Michael Steiner. 2015. Rich Queries on Encrypted Data: Beyond Exact Matches. In ESORICS 2015 (LNCS), Vol. 9327. 123--145."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3376122"},{"key":"e_1_3_2_1_16_1","volume-title":"CCS","author":"Grubbs Paul","year":"2018","unstructured":"Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. In CCS 2018. 315--331."},{"key":"e_1_3_2_1_17_1","volume-title":"CCS","author":"Gui Zichen","year":"2019","unstructured":"Zichen Gui, Oliver Johnson, and Bogdan Warinschi. 2019. Encrypted Databases: New Volume Attacks against Range Queries. In CCS 2019. 361--378."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0025"},{"key":"e_1_3_2_1_19_1","volume-title":"Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity. In EUROCRYPT 2017 (LNCS)","volume":"10212","author":"Kamara Seny","year":"2017","unstructured":"Seny Kamara and Tarik Moataz. 2017. Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity. In EUROCRYPT 2017 (LNCS), Vol. 10212. 94--124."},{"key":"e_1_3_2_1_20_1","volume-title":"SQL on Structurally-Encrypted Databases. In ASIACRYPT 2018 (LNCS)","volume":"11272","author":"Kamara Seny","year":"2018","unstructured":"Seny Kamara and Tarik Moataz. 2018. SQL on Structurally-Encrypted Databases. In ASIACRYPT 2018 (LNCS), Vol. 11272. 149--180."},{"key":"e_1_3_2_1_21_1","volume-title":"Computationally Volume-Hiding Structured Encryption. In EUROCRYPT 2019 (LNCS)","volume":"11477","author":"Kamara Seny","year":"2019","unstructured":"Seny Kamara and Tarik Moataz. 2019. Computationally Volume-Hiding Structured Encryption. In EUROCRYPT 2019 (LNCS), Vol. 11477. Springer, 183--213."},{"key":"e_1_3_2_1_22_1","volume-title":"Subset Predicate Encryption and Its Applications. In CANS 2017 (LNCS)","volume":"11261","author":"Katz Jonathan","year":"2017","unstructured":"Jonathan Katz, Matteo Maffei, Giulio Malavolta, and Dominique Schr\u00f6der. 2017. Subset Predicate Encryption and Its Applications. In CANS 2017 (LNCS), Vol. 11261. 115--134."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560593"},{"key":"e_1_3_2_1_24_1","volume-title":"Result Pattern Hiding Searchable Encryption for Conjunctive Queries. In CCS","author":"Lai Shangqi","year":"2018","unstructured":"Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, and Cong Zuo. 2018. Result Pattern Hiding Searchable Encryption for Conjunctive Queries. In CCS 2018. 745--762."},{"key":"e_1_3_2_1_25_1","volume-title":"Czech","author":"Majewski Bohdan S.","year":"1996","unstructured":"Bohdan S. Majewski, Nicholas C. Wormald, George Havas, and Zbigniew J. Czech. 1996. A Family of Perfect Hashing Methods. Comput. J. (1996), 547--554."},{"key":"e_1_3_2_1_26_1","volume-title":"Dynamic Local Searchable Symmetric Encryption. In CRYPTO 2022 (LNCS)","volume":"13510","author":"Minaud Brice","year":"2022","unstructured":"Brice Minaud and Michael Reichle. 2022. Dynamic Local Searchable Symmetric Encryption. In CRYPTO 2022 (LNCS), Vol. 13510. 91--120."},{"key":"e_1_3_2_1_27_1","first-page":"2307","article-title":"LEAP: Leakage-Abuse Attack on Efficiently Deployable","volume":"2021","author":"Ning Jianting","year":"2021","unstructured":"Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, and Robert H. Deng. 2021. LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. In CCS 2021. 2307--2320.","journal-title":"Efficiently Searchable Encryption with Partially Known Dataset. In CCS"},{"key":"e_1_3_2_1_28_1","first-page":"127","article-title":"Hiding the Access Pattern is Not Enough","volume":"2021","author":"Oya Simon","year":"2021","unstructured":"Simon Oya and Florian Kerschbaum. 2021. Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. In USENIX Security 2021. 127--142.","journal-title":"Exploiting Search Pattern Leakage in Searchable Encryption. In USENIX Security"},{"key":"e_1_3_2_1_29_1","first-page":"359","article-title":"Blind Seer","volume":"2014","author":"Pappas Vasilis","year":"2014","unstructured":"Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, and Steven M. Bellovin. 2014. Blind Seer: A Scalable Private DBMS. In S&P 2014. 359--374.","journal-title":"A Scalable Private DBMS. In S&P"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_20"},{"key":"e_1_3_2_1_31_1","volume-title":"CCS","author":"Patel Sarvar","year":"2019","unstructured":"Sarvar Patel, Giuseppe Persiano, Kevin Yeo, and Moti Yung. 2019. Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. In CCS 2019. 79--93."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00030"},{"key":"e_1_3_2_1_33_1","first-page":"1341","article-title":"The Shadow Nemesis: Inference Attacks on Efficiently Deployable","volume":"2016","author":"Pouliot David","year":"2016","unstructured":"David Pouliot and Charles V. Wright. 2016. The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption. In CCS 2016. 1341--1352.","journal-title":"Efficiently Searchable Encryption. In CCS"},{"key":"e_1_3_2_1_34_1","volume-title":"S&P","author":"Song Dawn Xiaodong","year":"2000","unstructured":"Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In S&P 2000. 44--55."},{"key":"e_1_3_2_1_35_1","volume-title":"Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In NDSS","author":"Sun Shi-Feng","year":"2021","unstructured":"Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, and Dawu Gu. 2021. Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. In NDSS 2021."},{"key":"e_1_3_2_1_36_1","volume-title":"S&P","author":"Paterson Kenneth G.","year":"2023","unstructured":"thomas Gui, Kenneth G. Paterson, and Sikhar Patranabis. 2023. Rethinking Searchable Symmetric Encryption. In S&P 2023. 1401--1418."},{"key":"e_1_3_2_1_37_1","first-page":"2371","article-title":"Omnes pro uno: Practical Multi-Writer Encrypted Database","volume":"2022","author":"Wang Jiafan","year":"2022","unstructured":"Jiafan Wang and Sherman S. M. Chow. 2022. Omnes pro uno: Practical Multi-Writer Encrypted Database. In USENIX Security 2022. 2371--2388.","journal-title":"USENIX Security"},{"key":"e_1_3_2_1_38_1","volume-title":"Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. In CCS","author":"Wang Jianfeng","year":"2022","unstructured":"Jianfeng Wang, Shi-Feng Sun, Tianci Li, Saiyu Qi, and Xiaofeng Chen. 2022. Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. In CCS 2022. 2825--2839."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70500-2_8"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Security","author":"Zhang Xianglong","year":"2023","unstructured":"Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, and Kaitai Liang. 2023. High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. In USENIX Security 2023. 5953--5970."},{"key":"e_1_3_2_1_41_1","first-page":"707","article-title":"All Your Queries Are Belong to Us","volume":"2016","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In USENIX Security 2016. 707--720.","journal-title":"The Power of File-Injection Attacks on Searchable Encryption. In USENIX Security"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3658644.3670355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:51:42Z","timestamp":1755841902000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3658644.3670355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":41,"alternative-id":["10.1145\/3658644.3670355","10.1145\/3658644"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3658644.3670355","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}