{"id":"https://openalex.org/W4308632370","doi":"https://doi.org/10.1145/3548606.3560610","title":"Strengthening Order Preserving Encryption with Differential Privacy","display_name":"Strengthening Order Preserving Encryption with Differential Privacy","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308632370","doi":"https://doi.org/10.1145/3548606.3560610"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560610","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560610","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101516679","display_name":"Amrita Roy Chowdhury","orcid":"https://orcid.org/0000-0001-5316-9422"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amrita Roy Chowdhury","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040297543","display_name":"Bolin Ding","orcid":"https://orcid.org/0000-0003-1535-9692"},"institutions":[{"id":"https://openalex.org/I4210095624","display_name":"Alibaba Group (United States)","ror":"https://ror.org/00rn0m335","country_code":"US","type":"company","lineage":["https://openalex.org/I4210095624","https://openalex.org/I45928872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bolin Ding","raw_affiliation_strings":["Alibaba Group, Seattle, WA, USA"],"affiliations":[{"raw_affiliation_string":"Alibaba Group, Seattle, WA, USA","institution_ids":["https://openalex.org/I4210095624"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088826068","display_name":"Somesh Jha","orcid":"https://orcid.org/0000-0001-5877-0436"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Somesh Jha","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101802649","display_name":"Weiran Liu","orcid":"https://orcid.org/0000-0002-1466-7418"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiran Liu","raw_affiliation_strings":["Alibaba Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Alibaba Group, Beijing, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057864403","display_name":"Jingren Zhou","orcid":"https://orcid.org/0000-0002-4220-2634"},"institutions":[{"id":"https://openalex.org/I4210095624","display_name":"Alibaba Group (United States)","ror":"https://ror.org/00rn0m335","country_code":"US","type":"company","lineage":["https://openalex.org/I4210095624","https://openalex.org/I45928872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jingren Zhou","raw_affiliation_strings":["Alibaba Group, Seattle, WA, USA"],"affiliations":[{"raw_affiliation_string":"Alibaba Group, Seattle, WA, USA","institution_ids":["https://openalex.org/I4210095624"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101516679"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":0.8392,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.74872801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2519","last_page":"2533"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7838228940963745},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7354613542556763},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.71915602684021},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.681605339050293},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.538729190826416},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5088920593261719},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4735640287399292},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4461742043495178},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4388566017150879},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41488659381866455},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33247146010398865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.262468546628952},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14549341797828674},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14048942923545837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7838228940963745},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7354613542556763},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.71915602684021},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.681605339050293},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.538729190826416},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5088920593261719},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4735640287399292},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4461742043495178},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4388566017150879},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41488659381866455},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33247146010398865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.262468546628952},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14549341797828674},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14048942923545837},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3560610","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560610","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":72,"referenced_works":["https://openalex.org/W216573885","https://openalex.org/W1502927489","https://openalex.org/W1895952394","https://openalex.org/W1968178015","https://openalex.org/W1981029888","https://openalex.org/W1992157848","https://openalex.org/W2027595342","https://openalex.org/W2043508455","https://openalex.org/W2055385473","https://openalex.org/W2074388704","https://openalex.org/W2082894754","https://openalex.org/W2088555617","https://openalex.org/W2092071682","https://openalex.org/W2098392677","https://openalex.org/W2104803737","https://openalex.org/W2109915041","https://openalex.org/W2154496743","https://openalex.org/W2155713641","https://openalex.org/W2159915142","https://openalex.org/W2163992091","https://openalex.org/W2232997092","https://openalex.org/W2233233025","https://openalex.org/W2400905995","https://openalex.org/W2532272970","https://openalex.org/W2539106208","https://openalex.org/W2588432088","https://openalex.org/W2739132638","https://openalex.org/W2753855453","https://openalex.org/W2789400187","https://openalex.org/W2795038002","https://openalex.org/W2804093830","https://openalex.org/W2804268522","https://openalex.org/W2889227180","https://openalex.org/W2891392853","https://openalex.org/W2900337061","https://openalex.org/W2912416028","https://openalex.org/W2914436942","https://openalex.org/W2914630606","https://openalex.org/W2915016908","https://openalex.org/W2952330491","https://openalex.org/W2962868942","https://openalex.org/W2963132290","https://openalex.org/W2963774362","https://openalex.org/W2964225135","https://openalex.org/W2996422317","https://openalex.org/W3015786640","https://openalex.org/W3022398217","https://openalex.org/W3031450565","https://openalex.org/W3032754641","https://openalex.org/W3080876524","https://openalex.org/W3082143661","https://openalex.org/W3099185500","https://openalex.org/W3102994281","https://openalex.org/W3117099605","https://openalex.org/W3126361953","https://openalex.org/W3127380200","https://openalex.org/W3141585064","https://openalex.org/W4230692091","https://openalex.org/W4232172926","https://openalex.org/W4234259925","https://openalex.org/W4237843976","https://openalex.org/W4246219036","https://openalex.org/W4248861293","https://openalex.org/W4251065218","https://openalex.org/W4254884627","https://openalex.org/W4287669117","https://openalex.org/W4297927038","https://openalex.org/W4300129074","https://openalex.org/W4301256072","https://openalex.org/W4387302738","https://openalex.org/W6657138077","https://openalex.org/W6744220956"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W3206966921"],"abstract_inverted_index":{"Ciphertexts":[0],"of":[1,10,38,43,59,89,115,121,152,194,200],"an":[2,198],"order-preserving":[3],"encryption":[4,80],"(OPE)":[5],"scheme":[6],"preserve":[7],"the":[8,31,39,56,87,92,99,113,119,126,156],"order":[9,78,90,144],"their":[11],"corresponding":[12],"plaintexts.":[13],"However,":[14],"OPEs":[15],"are":[16],"vulnerable":[17],"to":[18,129],"inference":[19,52,116],"attacks":[20],"that":[21,46,149],"exploit":[22],"this":[23,70,124],"preserved":[24],"order.":[25],"Differential":[26],"privacy":[27,67],"(DP)":[28],"has":[29],"become":[30],"de-facto":[32],"standard":[33],"for":[34,191],"data":[35],"privacy.":[36],"One":[37],"most":[40],"attractive":[41],"properties":[42],"DP":[44,61,109,131,158],"is":[45,94,125,137],"any":[47],"post-processing":[48],"computation,":[49],"such":[50],"as":[51],"attacks,":[53],"performed":[54],"on":[55,139,172,189],"noisy":[57],"output":[58],"a":[60,74,104,133,140,192],"algorithm":[62],"does":[63],"not":[64],"degrade":[65],"its":[66],"guarantee.":[68],"In":[69],"work,":[71],"we":[72],"propose":[73],"novel":[75,141],"differentially":[76,95,142],"private":[77,143],"preserving":[79,145],"scheme,":[81,147],"OP":[82,85,101,135,162,178],"\u03b5.":[83],"Under":[84],"\u03b5,":[86],"leakage":[88],"from":[91],"ciphertexts":[93],"private.":[96],"Consequently,":[97],"in":[98,112,155,165,184],"least,":[100],"\u03b5":[102,136,179],"ensures":[103],"formal":[105],"guarantee":[106],"(a":[107],"relaxed":[108],"guarantee)":[110],"even":[111],"face":[114],"attacks.":[117],"To":[118],"best":[120],"our":[122],"knowledge,":[123],"first":[127],"work":[128],"combine":[130],"with":[132,197],"OPE.":[134],"based":[138],"encoding":[146],"OP\u03b5c,":[148],"can":[150],"be":[151],"independent":[153],"interest":[154],"local":[157],"setting.":[159],"We":[160],"demonstrate":[161],"\u03b5's":[163],"utility":[164],"answering":[166],"range":[167],"queries":[168],"via":[169],"empirical":[170],"evaluation":[171],"four":[173],"real-world":[174],"datasets.":[175],"For":[176],"instance,":[177],"misses":[180],"only":[181],"around":[182],"4":[183],"every":[185],"10K":[186],"correct":[187],"records":[188],"average":[190],"dataset":[193],"size":[195,202],"~732K":[196],"attribute":[199],"domain":[201],"~18K":[203],"and":[204],"\u03b5=":[205],"1.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
