P.S. the security framework listed in the original comment is not mature, it requires further refinement, e.g. ensuring Bob's database level key does not provide a side channel to obtaining Alice's database level key