{"id":"https://openalex.org/W4416549595","doi":"https://doi.org/10.1145/3719027.3765038","title":"Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?","display_name":"Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549595","doi":"https://doi.org/10.1145/3719027.3765038"},"language":"en","primary_location":{"id":"doi:10.1145/3719027.3765038","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765038","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765038","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765038","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120467446","display_name":"Daniel P\u00f6llmann","orcid":"https://orcid.org/0000-0002-7674-2102"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Daniel P\u00f6llmann","raw_affiliation_strings":["ETH Zurich, Zurich, Switzerland"],"raw_orcid":"https://orcid.org/0000-0002-7674-2102","affiliations":[{"raw_affiliation_string":"ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045577309","display_name":"Tianxin Tang","orcid":"https://orcid.org/0000-0003-2179-6709"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tianxin Tang","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, Netherlands"],"raw_orcid":"https://orcid.org/0000-0003-2179-6709","affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5120467446"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18459165,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1754","last_page":"1768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.772599995136261},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5591999888420105},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5523999929428101},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5214999914169312},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.48890000581741333},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4887999892234802},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.477400004863739},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.42149999737739563}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.772599995136261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041000127792358},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6789000034332275},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5591999888420105},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5523999929428101},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5214999914169312},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.48890000581741333},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4887999892234802},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.477400004863739},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.42149999737739563},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4108999967575073},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3849000036716461},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3790999948978424},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.33709999918937683},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3181000053882599},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3009999990463257},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2833000123500824},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2824000120162964},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2540000081062317}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3719027.3765038","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765038","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765038","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:doi:10.3929/ethz-c-000789745","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.11850/789745","pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765038","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765038","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765038","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5231279730","display_name":"A solid theory for post-quantum cryptography","funder_award_id":"VI.Vidi.193.066","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416549595.pdf","grobid_xml":"https://content.openalex.org/works/W4416549595.grobid-xml"},"referenced_works_count":61,"referenced_works":["https://openalex.org/W1539859404","https://openalex.org/W1873763122","https://openalex.org/W1895952394","https://openalex.org/W2016575873","https://openalex.org/W2033165262","https://openalex.org/W2074388704","https://openalex.org/W2086763678","https://openalex.org/W2092071682","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2170993700","https://openalex.org/W2171200367","https://openalex.org/W2294070790","https://openalex.org/W2532292902","https://openalex.org/W2535294034","https://openalex.org/W2539385377","https://openalex.org/W2592789682","https://openalex.org/W2639926268","https://openalex.org/W2765463836","https://openalex.org/W2792158747","https://openalex.org/W2794508460","https://openalex.org/W2795193970","https://openalex.org/W2809996417","https://openalex.org/W2891020614","https://openalex.org/W2891392853","https://openalex.org/W2898997176","https://openalex.org/W2900337061","https://openalex.org/W2902857846","https://openalex.org/W2946109000","https://openalex.org/W2950330052","https://openalex.org/W2962901170","https://openalex.org/W2984157150","https://openalex.org/W2986992030","https://openalex.org/W2990722039","https://openalex.org/W3008291567","https://openalex.org/W3015963927","https://openalex.org/W3030902227","https://openalex.org/W3094755447","https://openalex.org/W3107725882","https://openalex.org/W3127380200","https://openalex.org/W3128145396","https://openalex.org/W3128530640","https://openalex.org/W3139404512","https://openalex.org/W3212692821","https://openalex.org/W4205228770","https://openalex.org/W4283380702","https://openalex.org/W4293310105","https://openalex.org/W4308432025","https://openalex.org/W4308632370","https://openalex.org/W4321448320","https://openalex.org/W4365807735","https://openalex.org/W4365934718","https://openalex.org/W4385080249","https://openalex.org/W4386754075","https://openalex.org/W4388857730","https://openalex.org/W4389315099","https://openalex.org/W4400120322","https://openalex.org/W4400382070","https://openalex.org/W4401352604","https://openalex.org/W4405181165","https://openalex.org/W7140287529"],"related_works":[],"abstract_inverted_index":{"Encrypted":[0],"search":[1,17],"focuses":[2],"on":[3,38],"protecting":[4],"sensitive":[5],"data":[6,79],"in":[7],"outsourced":[8,40],"environments":[9],"while":[10],"enabling":[11],"private":[12],"queries.":[13],"Although":[14],"standard":[15],"encrypted":[16],"algorithms":[18],"are":[19],"efficient,":[20],"they":[21,86],"often":[22],"leak":[23],"some":[24,71],"information":[25],"about":[26],"the":[27,35,39,63,83],"queries":[28,55],"and":[29,56,68],"data.":[30],"One":[31],"such":[32],"leakage":[33,50],"is":[34],"access":[36,84],"pattern":[37],"storage.":[41],"Recent":[42],"leakage-abuse":[43],"attacks":[44],"have":[45],"exploited":[46],"this":[47],"seemingly":[48],"harmless":[49],"to":[51,81],"successfully":[52],"recover":[53],"both":[54],"data,":[57],"shifting":[58],"research":[59],"priorities":[60],"towards":[61],"finding":[62],"right":[64],"balance":[65],"between":[66],"privacy":[67],"performance.":[69],"While":[70],"proposals":[72],"leverage":[73],"oblivious":[74,78],"RAM":[75],"or":[76],"other":[77],"structures":[80],"hide":[82],"pattern,":[85],"typically":[87],"incur":[88],"significant":[89],"bandwidth":[90],"costs.":[91]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-11-23T00:00:00"}
