Paper 2010/484
Automata Evaluation and Text Search Protocols with Simulation Based Security
Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen
Abstract
This paper presents efficient protocols for securely computing the following two problems:
1) The fundamental problem of pattern matching. This problem is defined in the two-party setting, where party
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Full version of a PKC 2010 paper
- Keywords
- secure two-party computationefficient protocolsfull simulation-based securitytext search
- Contact author(s)
- carmit hazay @ gmail com
- History
- 2014-08-06: last of 2 revisions
- 2010-09-15: received
- See all versions
- Short URL
- https://ia.cr/2010/484
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/484, author = {Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen}, title = {Automata Evaluation and Text Search Protocols with Simulation Based Security}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/484}, year = {2010}, url = {https://eprint.iacr.org/2010/484} }