
ACKNOWLEDGEMENTS
This research was partly supported by JSPS KAK-
ENHI Grant Numbers JP22J23910 and the Daiichi-
Sankyo ”Habataku” Support Program for the Next
Generation of Researchers, NAIST Senju Monju
Project.
REFERENCES
Bian, S., Zhang, Z., Pan, H., Mao, R., Zhao, Z., Jin, Y.,
and Guan, Z. (2023). He3db: An Efficient and Elastic
Encrypted Database via Arithmetic-And-Logic Fully
Homomorphic Encryption. In Proceedings of the
2023 ACM SIGSAC Conference on Computer and
Communications Security, pages 2930–2944.
Falk, B. H., Nema, R., and Ostrovsky, R. (2023). Linear-
Time 2-Party Secure Merge from Additively Homo-
morphic Encryption. Journal of Computer and System
Sciences, 137:37–49.
Goldreich, O. and Ostrovsky, R. (1996). Software Protec-
tion and Simulation on Oblivious RAMs. Journal of
the ACM, 43(3):431–473.
Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson,
W., Paul, W., Calandrino, J. A., Feldman, A. J., Appel-
baum, J., and Felten, E. W. (2009). Lest We Remem-
ber: Cold-Boot Attacks on Encryption Keys. Commu-
nications of the ACM, 52(5):91–98.
Intel (2023). Intel Trust Domain Extensions (Intel
TDX) Module v1.5 Base Architecture Specification.
https://www.intel.com/content/www/us/en/developer/
articles/technical/inteltrust-domain-extensions.html.
Islam, M. S., Kuzu, M., and Kantarcioglu, M. (2012).
Access Pattern Disclosure on Searchable Encryption:
Ramification, Attack and Mitigation. In Network and
Distributed System Security Symposium, volume 20,
page 12. Citeseer.
Kirman, N. and Martinez, J. F. (2010). A Power-Efficient
All-Optical On-Chip Interconnect Using Wavelength-
Based Oblivious Routing. ACM Sigplan Notices,
45(3):15–28.
Li, L. and Datta, A. (2017). Write-Only Oblivious RAM-
Based Privacy-Preserved Access of Outsourced Data.
International Journal of Information Security, 16:23–
42.
Liu, Z., Huang, Y., Li, J., Cheng, X., and Shen, C. (2018).
DivORAM: Towards a Practical Oblivious RAM with
Variable Block Size. Information Sciences, 447:1–11.
Moataz, T., Mayberry, T., and Blass, E.-O. (2015). Constant
Communication ORAM with Small Blocksize. In
Proceedings of the 22nd ACM SIGSAC Conference on
Computer and Communications Security, pages 862–
873.
Poddar, R., Boelter, T., and Popa, R. A. (2016). Arx: A
Strongly Encrypted Database System. IACR Cryptol.
ePrint Arch., 2016:591.
Popa, R. A., Redfield, C. M., Zeldovich, N., and Balakr-
ishnan, H. (2011). CryptDB: Protecting Confidential-
ity with Encrypted Query Processing. In Proceedings
of the twenty-third ACM symposium on operating sys-
tems principles, pages 85–100.
Rabin, M. O. (2005). How to Exchange Secrets with
Oblivious Transfer. IACR Cryptology ePrint Archive,
2005(187).
Roche, D. S., Aviv, A., Choi, S. G., and Mayberry,
T. (2017). Deterministic, Stash-Free Write-Only
ORAM. In Proceedings of the 2017 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 507–521.
Sasada, T., Taenaka, Y., and Kadobayashi, Y. (2022).
Decoupling Statistical Trends from Data Volume on
LDP-Based Spatio-Temporal Data Collection. In
2022 IEEE Future Networks World Forum, pages
262–269. IEEE.
Sasada, T., Taenaka, Y., and Kadobayashi, Y. (2023). Obliv-
ious Statistic Collection with Local Differential Pri-
vacy in Mutual Distrust. IEEE Access, 11:21374–
21386.
Stefanov, E., Dijk, M. v., Shi, E., Chan, T.-H. H., Fletcher,
C., Ren, L., Yu, X., and Devadas, S. (2018). Path
ORAM: An Extremely Simple Oblivious RAM Pro-
tocol. Journal of the ACM, 65(4):1–26.
Suzuki, T., Sasada, T., Taenaka, Y., and Kadobayashi,
Y. (2024). Mosaicdb: An efficient trusted/untrusted
memory management for location data in database.
The Sixteenth International Conference on Advances
in Databases, Knowledge, and Data Applications,
pages 1–6.
Vinayagamurthy, D., Gribov, A., and Gorbunov, S. (2019).
Stealthdb: a scalable encrypted database with full sql
query support. Proceedings on Privacy Enhancing
Technologies.
Yang, X., Yue, C., Zhang, W., Liu, Y., Ooi, B. C., and Chen,
J. (2024). Secudb: An in-enclave privacy-preserving
and tamper-resistant relational database. Proceedings
of the VLDB Endowment, 17(12):3906–3919.
Yitbarek, S. F., Aga, M. T., Das, R., and Austin, T. (2017).
Cold Boot Attacks Are still Hot: Security Analysis of
Memory Scramblers in Modern Processors. In 2017
IEEE International Symposium on High Performance
Computer Architecture, pages 313–324. IEEE.
Yoshimura, M., Sasada, T., Taenaka, Y., and Kadobayashi,
Y. (2023). Memory efficient data-protection for
database utilizing secure/unsecured area of intel sgx.
The Sixteenth International Conference on Advances
in Databases, Knowledge, and Data Applications,
pages 45–50.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
642