“…There have been a series of efforts under the literature of secure outsourcing databases. Existing solutions utilize bucketization [40][41][42], predicate encryption [59,75], property and order preserving encryption [2,9,12,13,66,68,69], symmetric searchable encryption (SSE) [3,11,20,26,35,45,46,48,50,67,78], functional encryption [15,74], oblivious RAM [6,24,28,43,65,89], multi-party secure computation (MPC) [6,7,14,79], trusted execution environments (TEE) [32,70,81,87] and homomorphic encryption [16,22,34,72]. These designs differ in the types of supported queries and the provided security guarantees.…”