Text search protocols with simulation based security

Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

37 Scopus citations

Abstract

This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P 1 holds a pattern and party P 2 holds a text. The goal of P 1 is to learn where the pattern appears in the text, without revealing it to P 2 or learning anything else about P 2's text. Our protocol is the first to address this problem with full security in the face of malicious adversaries. The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem party P 1 holds an automaton and party P 2 holds an input string, and they need to decide if the automaton accepts the input, without learning anything else.

Original languageEnglish
Title of host publicationPublic Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings
Pages332-350
Number of pages19
DOIs
StatePublished - 2010
Externally publishedYes
Event13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010 - Paris, France
Duration: 26 May 201028 May 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6056 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010
Country/TerritoryFrance
CityParis
Period26/05/1028/05/10

Bibliographical note

Funding Information:
This research was supported by a National Institutes of Health Grant, GM 26020, and by a grant-in-aid from the American Heart Association with funds contributed in part by the Greater Los Angeles Affiliate.

Fingerprint

Dive into the research topics of 'Text search protocols with simulation based security'. Together they form a unique fingerprint.

Cite this