Authors
Rosario Gennaro, Carmit Hazay, Jeffrey S Sorensen
Publication date
2010
Conference
Public Key Cryptography–PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings 13
Pages
332-350
Publisher
Springer Berlin Heidelberg
Description
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P 1 holds a pattern and party P 2 holds a text. The goal of P 1 is to learn where the pattern appears in the text, without revealing it to P 2 or learning anything else about P 2’s text. Our protocol is the first to address this problem with full security in the face of malicious adversaries. The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem party P 1 holds an automaton and party P 2 holds an input string, and they need to decide if the automaton accepts the input, without learning anything else.
Total citations
20102011201220132014201520162017201820192020202120222023202427587864363421
Scholar articles
R Gennaro, C Hazay, JS Sorensen - Public Key Cryptography–PKC 2010: 13th International …, 2010