Open full page Download PDFDiscussion & RelatedRethinking Encrypted Search: From Access Pattern Leakage to Information-Theoretic PrivacyOctober 14, 2025 · 4 min read