Our protocol is the first to address this problem with full security in the face of malicious adversaries. The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem, party P1 holds an automaton and party P2 holds an input string, and they need to decide if the automaton accepts the input, without learning anything else.
Category / Keywords: text search, malicious adversary, simulation based security Publication Info: Full version of a PKC 2010 paper Date: received 14 Sep 2010, last revised 15 Sep 2010 Contact author: carmit hazay at gmail com Available formats: PDF | BibTeX Citation Version: 20100916:055853 (All versions of this report) Discussion forum: Show discussion | Start new discussion