Search problems

Carmit Hazay, Yehuda Lindell

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


Recently, there has been much interest in the data mining and other communities for secure protocols for a wide variety of tasks. This interest exists not only in academic circles, but also in industry, in part due to the growing conflict between the privacy concerns of citizens and the homeland security needs of governments. In this chapter we focus on search problems involving two parties; a client that is interested in performing a search in a database that is being held by a server. The (informal) security requirements for search problems assert that the server should not learn any useful information regarding the search conducted by the client, while the client should learn the search result but nothing more.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Number of pages28
StatePublished - 2010

Publication series

NameInformation Security and Cryptography
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Bibliographical note

Publisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.


Dive into the research topics of 'Search problems'. Together they form a unique fingerprint.

Cite this