Automata Evaluation and Text Search Protocols with Simulation-Based Security

Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

This paper presents efficient protocols for securely computing the following two problems: (1) The fundamental problem of pattern matching. This problem is defined in the two-party setting, where party (Formula presented.) holds a pattern and party (Formula presented.) holds a text. The goal of (Formula presented.) is to learn where the pattern appears in the text, without revealing it to (Formula presented.) or learning anything else about (Formula presented.) ’s text. This problem has been widely studied for decades due to its broad applicability. We present several protocols for several notions of security. We further generalize one of our solutions to solve additional pattern matching-related problems of interest. (2) Our construction from above, in the malicious case, is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem, party (Formula presented.) holds an automaton and party (Formula presented.) holds an input string, and they need to decide whether the automaton accepts the input, without learning anything else. Our protocol obtains full security in the face of malicious adversaries.

Original languageEnglish
Pages (from-to)243-282
Number of pages40
JournalJournal of Cryptology
Volume29
Issue number2
DOIs
StatePublished - 1 Apr 2016

Bibliographical note

Publisher Copyright:
© 2015, International Association for Cryptologic Research.

Keywords

  • Oblivious automata evaluation
  • Simulation-based security
  • Text search

Fingerprint

Dive into the research topics of 'Automata Evaluation and Text Search Protocols with Simulation-Based Security'. Together they form a unique fingerprint.

Cite this