D. Cash, P. Grubbs, J. Perry, and T. Ristenpart, Leakage-abuse attacks against searchable encryption, p.668679, 2015.

M. Naveed, S. Kamara, and C. V. Wright, Inference attacks on property-preserving encrypted databases, p.644655, 2015.

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, S&P 2000, p.4455, 2000.

M. S. Islam, M. Kuzu, and M. Kantarcioglu, Access pattern disclosure on searchable encryption: Ramication, attack and mitigation, NDSS 2012, 2012.

R. Ostrovsky, Ecient computation on oblivious rams, STOC 1990, p.514523, 1990.

O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious rams, J. ACM, vol.43, issue.3, p.431473, 1996.

E. Stefanov, M. Van-dijk, E. Shi, C. W. Fletcher, L. Ren et al., Path ORAM: an extremely simple oblivious RAM protocol, p.299310, 2013.

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, J. ACM, vol.45, issue.6, p.965981, 1998.

P. Williams, R. Sion, and P. Usable, NDSS 2008. The Internet Society, 2008.

M. R. Asghar, G. Russello, B. Crispo, and M. Ion, Supporting complex queries and access policies for multi-user encrypted databases, p.7788, 2013.

E. Stefanov, C. Papamanthou, and E. Shi, Practical dynamic searchable encryption with small leakage, NDSS 2013, vol.71, p.7275, 2014.

Y. Ishai, E. Kushilevitz, S. Lu, and R. Ostrovsky, Private large-scale databases with distributed searchable symmetric encryption, CT-RSA 2016, ser. Lecture Notes in Computer Science, K. Sako, vol.9610, p.90107, 2016.

S. Cui, M. R. Asghar, S. Galbraith, and G. Russello, Secure and practical searchable encryption: A position paper, ser. Lecture Notes in Computer Science, 2017.

R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved denitions and ecient constructions, CCS 2006, A. Juels, p.7988, 2006.

S. Kamara and C. Papamanthou, Parallel and dynamic searchable symmetric encryption, in FC 2013, ser. Lecture Notes in Computer Science, vol.7859, p.258274, 2013.

J. Jannink, Implementing deletion in B+-trees, SIGMOD Rec, p.3338, 1995.