Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

192 Scopus citations

Abstract

In this paper we construct efficient secure protocols for set intersection and pattern matching. Our protocols for securely computing the set intersection functionality are based on secure pseudorandom function evaluations, in contrast to previous protocols that used secure polynomial evaluation. In addition to the above, we also use secure pseudorandom function evaluation in order to achieve secure pattern matching. In this case, we utilize specific properties of the Naor-Reingold pseudorandom function in order to achieve high efficiency. Our results are presented in two adversary models. Our protocol for secure pattern matching and one of our protocols for set intersection achieve security against malicious adversaries under a relaxed definition where one corruption case is simulatable and for the other only privacy (formalized through indistinguishability) is guaranteed. We also present a protocol for set intersection that is fully simulatable in the model of covert adversaries. Loosely speaking, this means that a malicious adversary can cheat, but will then be caught with good probability.

Original languageEnglish
Title of host publicationTheory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings
Pages155-175
Number of pages21
DOIs
StatePublished - 2008
Event5th Theory of Cryptography Conference, TCC 2008 - New York, United States
Duration: 19 Mar 200821 Mar 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4948 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th Theory of Cryptography Conference, TCC 2008
Country/TerritoryUnited States
CityNew York
Period19/03/0821/03/08

Bibliographical note

Funding Information:
This research was supported by an Eshkol scholarship and Infrastructures grant from the Israel Ministry of Science and Technology.

Fingerprint

Dive into the research topics of 'Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries'. Together they form a unique fingerprint.

Cite this