Our results are presented in two adversary models. Our protocol for secure pattern matching and one of our protocols for set intersection achieve security against \emph{malicious adversaries} under a relaxed definition where one corruption case is simulatable and for the other only privacy (formalized through indistinguishability) is guaranteed. We also present a protocol for set intersection that is fully simulatable in the model of covert adversaries. Loosely speaking, this means that a malicious adversary can cheat, but will then be caught with good probability.
Category / Keywords: cryptographic protocols / secure set intersection, secure pattern matching, oblivious pseudorandom function evaluation Publication Info: An extended abstract of this paper appeared in TCC 2008; this is the full version. Date: received 26 Jan 2009 Contact author: lindell at cs biu ac il Available formats: PDF | BibTeX Citation Version: 20090129:151629 (All versions of this report) Discussion forum: Show discussion | Start new discussion