Public Key Cryptography – PKC 2010
Volume 6056 of the series Lecture Notes in Computer Science pp 332-350
Text Search Protocols with Simulation Based Security
- Rosario GennaroAffiliated withIBM T.J. Watson Research Center
- , Carmit HazayAffiliated withDept. of Computer Science and Applied Mathematics, Weizmann Institute and IDC
- , Jeffrey S. SorensenAffiliated withIBM T.J. Watson Research Center
Abstract
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P 1 holds a pattern and party P 2 holds a text. The goal of P 1 is to learn where the pattern appears in the text, without revealing it to P 2 or learning anything else about P 2’s text. Our protocol is the first to address this problem with full security in the face of malicious adversaries. The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem party P 1 holds an automaton and party P 2 holds an input string, and they need to decide if the automaton accepts the input, without learning anything else.
- Title
- Text Search Protocols with Simulation Based Security
- Book Title
- Public Key Cryptography – PKC 2010
- Book Subtitle
- 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings
- Pages
- pp 332-350
- Copyright
- 2010
- DOI
- 10.1007/978-3-642-13013-7_20
- Print ISBN
- 978-3-642-13012-0
- Online ISBN
- 978-3-642-13013-7
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 6056
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
- Phong Q. Nguyen (16)
- David Pointcheval (16)
- Editor Affiliations
-
- 16. Département d’Informatique, École Normale Supérieure
- Authors
-
- Rosario Gennaro (17)
- Carmit Hazay (18)
- Jeffrey S. Sorensen (17)
- Author Affiliations
-
- 17. IBM T.J. Watson Research Center, Hawthorne, New York, USA
- 18. Dept. of Computer Science and Applied Mathematics, Weizmann Institute and IDC, Israel
Continue reading...
To view the rest of this content please follow the download PDF link above.