{"id":"https://openalex.org/W4389609625","doi":"https://doi.org/10.1145/3626759","title":"Veil: A Storage and Communication Efficient Volume-Hiding Algorithm","display_name":"Veil: A Storage and Communication Efficient Volume-Hiding Algorithm","publication_year":2023,"publication_date":"2023-12-08","ids":{"openalex":"https://openalex.org/W4389609625","doi":"https://doi.org/10.1145/3626759"},"language":"en","primary_location":{"id":"doi:10.1145/3626759","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3626759","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3626759","source":{"id":"https://openalex.org/S4387289859","display_name":"Proceedings of the ACM on Management of Data","issn_l":"2836-6573","issn":["2836-6573"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Management of Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3626759","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101755193","display_name":"Shanshan Han","orcid":"https://orcid.org/0000-0002-2788-8834"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shanshan Han","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"raw_orcid":"https://orcid.org/0000-0002-2788-8834","affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066165817","display_name":"Vishal Chakraborty","orcid":"https://orcid.org/0000-0002-0997-4149"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vishal Chakraborty","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"raw_orcid":"https://orcid.org/0000-0002-0997-4149","affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034971300","display_name":"Michael T. Goodrich","orcid":"https://orcid.org/0000-0002-8943-191X"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael T. Goodrich","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"raw_orcid":"https://orcid.org/0000-0002-8943-191X","affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010114060","display_name":"Sharad Mehrotra","orcid":"https://orcid.org/0000-0003-1667-5435"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sharad Mehrotra","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"raw_orcid":"https://orcid.org/0000-0003-1667-5435","affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067042141","display_name":"Shantanu Sharma","orcid":"https://orcid.org/0000-0002-1339-5481"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shantanu Sharma","raw_affiliation_strings":["New Jersey Institute of Technology, Newark, NJ, USA"],"raw_orcid":"https://orcid.org/0000-0002-1339-5481","affiliations":[{"raw_affiliation_string":"New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101755193"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":1.0225,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81863448,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"1","issue":"4","first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7705111503601074},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6922654509544373},{"id":"https://openalex.org/keywords/volume","display_name":"Volume (thermodynamics)","score":0.6478576064109802},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6074098348617554},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.590684175491333},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5815758109092712},{"id":"https://openalex.org/keywords/padding","display_name":"Padding","score":0.5472138524055481},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4966495633125305},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4163479208946228},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39911431074142456},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38314440846443176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3593593239784241},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35874369740486145},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3400854766368866},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33442598581314087},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07535883784294128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7705111503601074},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6922654509544373},{"id":"https://openalex.org/C20556612","wikidata":"https://www.wikidata.org/wiki/Q4469374","display_name":"Volume (thermodynamics)","level":2,"score":0.6478576064109802},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6074098348617554},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.590684175491333},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5815758109092712},{"id":"https://openalex.org/C165435473","wikidata":"https://www.wikidata.org/wiki/Q1509884","display_name":"Padding","level":2,"score":0.5472138524055481},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4966495633125305},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4163479208946228},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39911431074142456},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38314440846443176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3593593239784241},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35874369740486145},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3400854766368866},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33442598581314087},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07535883784294128},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3626759","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3626759","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3626759","source":{"id":"https://openalex.org/S4387289859","display_name":"Proceedings of the ACM on Management of Data","issn_l":"2836-6573","issn":["2836-6573"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Management of Data","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3626759","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3626759","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3626759","source":{"id":"https://openalex.org/S4387289859","display_name":"Proceedings of the ACM on Management of Data","issn_l":"2836-6573","issn":["2836-6573"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Management of Data","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G273362758","display_name":null,"funder_award_id":"2133391","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5155217755","display_name":null,"funder_award_id":"2008993","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6910784930","display_name":null,"funder_award_id":"1527536","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7052561742","display_name":null,"funder_award_id":"1545071","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7161285362","display_name":null,"funder_award_id":"2032525","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7755616824","display_name":"Collaborative Research: SaTC: CORE: Medium: Compliance as a Service (CaSe): A Reflective Approach to Enforcing User Privacy Regulations","funder_award_id":"2245372","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8186708054","display_name":null,"funder_award_id":"1952247","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332688","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389609625.pdf","grobid_xml":"https://content.openalex.org/works/W4389609625.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1539859404","https://openalex.org/W1988374166","https://openalex.org/W1996453724","https://openalex.org/W2005756274","https://openalex.org/W2076623138","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2159915142","https://openalex.org/W2227629474","https://openalex.org/W2481158741","https://openalex.org/W2532292902","https://openalex.org/W2536125594","https://openalex.org/W2539106208","https://openalex.org/W2600805457","https://openalex.org/W2794508460","https://openalex.org/W2796933658","https://openalex.org/W2883042185","https://openalex.org/W2904207032","https://openalex.org/W2905148424","https://openalex.org/W2914403634","https://openalex.org/W2946109000","https://openalex.org/W2950674756","https://openalex.org/W2954220898","https://openalex.org/W2984157150","https://openalex.org/W2986992030","https://openalex.org/W2990722039","https://openalex.org/W2994941531","https://openalex.org/W3011810846","https://openalex.org/W3028864909","https://openalex.org/W3045938543","https://openalex.org/W3091935896","https://openalex.org/W3130747712","https://openalex.org/W3176023616","https://openalex.org/W4281773245","https://openalex.org/W4299301436","https://openalex.org/W4308643128","https://openalex.org/W4321448341","https://openalex.org/W6778209916"],"related_works":["https://openalex.org/W2142641794","https://openalex.org/W2503150695","https://openalex.org/W189451467","https://openalex.org/W2358406440","https://openalex.org/W3123987581","https://openalex.org/W2352435628","https://openalex.org/W3096760981","https://openalex.org/W151758239","https://openalex.org/W3175365978","https://openalex.org/W3011894940"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"volume":[3,52],"leakage":[4,6],"(i.e.,":[5],"of":[7,10,67],"the":[8,13,58,92,106],"number":[9],"records":[11],"in":[12,20],"answer":[14],"set)":[15],"when":[16],"processing":[17],"keyword":[18],"queries":[19],"encrypted":[21],"key-value":[22],"(KV)":[23],"datasets.":[24],"Volume":[25],"leakage,":[26,53],"coupled":[27],"with":[28],"prior":[29],"knowledge":[30],"about":[31],"data":[32,76],"distribution":[33],"and/or":[34],"previously":[35],"executed":[36],"queries,":[37],"can":[38],"reveal":[39],"both":[40],"ciphertexts":[41],"and":[42,84,114],"current":[43],"user":[44],"queries.":[45],"We":[46],"develop":[47],"a":[48,65,72,80,96],"solution":[49],"to":[50,64,78,91,103,108,119],"prevent":[51],"entitled":[54],"Veil,":[55],"that":[56,100],"partitions":[57],"dataset":[59],"by":[60],"randomly":[61],"mapping":[62],"keys":[63],"set":[66],"equi-sized":[68],"buckets.":[69],"Veil":[70,94,118],"provides":[71],"tunable":[73],"mechanism":[74],"for":[75],"owners":[77],"explore":[79],"trade-off":[81],"between":[82],"storage":[83],"communication":[85],"overheads.":[86],"To":[87],"make":[88],"buckets":[89,102],"indistinguishable":[90],"adversary,":[93],"uses":[95],"novel":[97],"padding":[98],"strategy":[99],"allow":[101],"overlap,":[104],"reducing":[105],"need":[107],"add":[109],"fake":[110],"records.":[111],"Both":[112],"theoretical":[113],"experimental":[115],"results":[116],"show":[117],"significantly":[120],"outperform":[121],"existing":[122],"state-of-the-art.":[123]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
