
ACKNOWLEDGEMENTS
The authors are thankful to the anonymous review-
ers for their help in improving the manuscript. The
authors are supported by NSF Awards # 2131509,
2141033, 2146852, 2232813, 2333899, and 2341378.
REFERENCES
Akshima, Cash, D., Falzon, F., Rivkin, A., and Stern,
J. (2020). Multidimensional database reconstruction
from range query access patterns. Cryptology ePrint
Archive.
Bellare, M., Fischlin, M., O’Neill, A., and Ristenpart,
T. (2008). Deterministic encryption: Definitional
equivalences and constructions without random ora-
cles. In CRYPTO, pages 360–378, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Bentley, J. L. (1975). Multidimensional binary search trees
used for associative searching. Communications of the
ACM, 18(9):509–517.
Boneh, D. and Waters, B. (2007). Conjunctive, subset, and
range queries on encrypted data. In Theory of Cryp-
tography Conference, pages 535–554. Springer.
B
¨
osch, C., Hartel, P., Jonker, W., and Peter, A. (2014).
A survey of provably secure searchable encryption.
ACM Computing Surveys (CSUR), 47(2):1–51.
Chase, M. and Kamara, S. (2010). Structured encryption
and controlled disclosure. In Asiacrypt, pages 577–
594. Springer.
Demertzis, I., Papadopoulos, D., Papamanthou, C., and
Shintre, S. (2020). SEAL: Attack mitigation for en-
crypted databases via adjustable leakage. In USENIX
Security, pages 2433–2450.
Demertzis, I., Papadopoulos, S., Papapetrou, O., Deligian-
nakis, A., and Garofalakis, M. (2016). Practical pri-
vate range search revisited. In ACM SIGMOD/PODS
Conference.
Falzon, F., Markatou, E. A., Cash, D., Rivkin, A., Stern, J.,
and Tamassia, R. (2020). Full database reconstruction
in two dimensions. In CCS, pages 443–460.
Falzon, F., Markatou, E. A., Espiritu, Z., and Tamassia, R.
(2022). Range search over encrypted multi-attribute
data. Proc. VLDB Endow., 16(4):587–600.
Falzon, F., Markatou, E. A., Espiritu, Z., and Tamassia, R.
(2023). Range search over encrypted multi-attribute
data. In VLDB. https://eprint.iacr.org/2022/1076.
Fuller, B., Varia, M., Yerukhimovich, A., Shen, E., Ham-
lin, A., Gadepally, V., Shay, R., Mitchell, J. D., and
Cunningham, R. K. (2017). SoK: Cryptographically
protected database search. In IEEE Security and Pri-
vacy, pages 172–191.
Goldreich, O. (1987). Towards a theory of software pro-
tection and simulation by oblivious rams. In STOC,
pages 182–194.
Goldreich, O. and Ostrovsky, R. (1996). Software protec-
tion and simulation on oblivious rams. Journal of the
ACM (JACM), 43(3):431–473.
Grubbs, P., Khandelwal, A., Lacharit
´
e, M.-S., Brown, L.,
Li, L., Agarwal, R., and Ristenpart, T. (2020). Pan-
cake: Frequency smoothing for encrypted data stores.
In USENIX Security, pages 2451–2468.
Grubbs, P., Lacharit
´
e, M.-S., Minaud, B., and Paterson,
K. G. (2018). Pump up the volume: Practical database
reconstruction from volume leakage on range queries.
In CCS, pages 315–331.
Grubbs, P., Ristenpart, T., and Shmatikov, V. (2017). Why
your encrypted database is not secure. In Proceedings
of the 16th workshop on hot topics in operating sys-
tems, pages 162–168.
Gui, Z., Paterson, K. G., and Patranabis, S. (2023a). Re-
thinking searchable symmetric encryption. In IEEE
Security and Privacy.
Gui, Z., Paterson, K. G., Patranabis, S., and Warinschi, B.
(2023b). SWiSSSE: System-wide security for search-
able symmetric encryption. PoPETS.
Heidaripour, M., Kian, L., Rezapour, M., Holcomb, M.,
Fuller, B., Agrawal, G., and Maleki, H. (2024). Orga-
nizing records for retrieval in multi-dimensional range
searchable encryption. Cryptology ePrint Archive, Pa-
per 2024/635. https://eprint.iacr.org/2024/635.
Kamara, S., Kati, A., Moataz, T., Schneider, T., Treiber,
A., and Yonli, M. (2022). Sok: Cryptanalysis of
encrypted search with LEAKER - a framework for
LEakage AttacK Evaluation on Real-world data. In
Euro S&P.
Maiyya, S., Vemula, S. C., Agrawal, D., El Abbadi, A., and
Kerschbaum, F. (2023). Waffle: An online oblivious
datastore for protecting data access patterns. Proceed-
ings of the ACM on Management of Data, 1(4):1–25.
Markatou, E. A., Falzon, F., Espiritu, Z., and Tamassia, R.
(2023). Attacks on encrypted response-hiding range
search schemes in multiple dimensions. PoPETS.
Markatou, E. A., Falzon, F., Tamassia, R., and Schor, W.
(2021). Reconstructing with less: Leakage abuse at-
tacks in two dimensions. In CCS, pages 2243–2261.
Markatou, E. A. and Tamassia, R. (2019). Full database
reconstruction with access and search pattern leakage.
In International Conference on Information Security,
pages 25–43. Springer.
pyca/cryptography (2023). Python cryptography library
40.0.2. https://cryptography.io.
Rusu, F. (2023). Multidimensional array data management.
Foundations and Trends® in Databases, 12(2-3):69–
220.
Song, D. X., Wagner, D., and Perrig, A. (2000). Practical
techniques for searches on encrypted data. In IEEE
Security and Privacy, pages 44–55. IEEE.
Tu, S. L., Kaashoek, M. F., Madden, S. R., and Zeldovich,
N. (2013). Processing analytical queries over en-
crypted data. In VLDB. Association for Computing
Machinery (ACM).
SECRYPT 2024 - 21st International Conference on Security and Cryptography
466