You are looking at a specific version 20100916:055853 of this paper. See the latest version.

Paper 2010/484

Automata Evaluation and Text Search Protocols with Simulation Based Security

Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen

Abstract

This paper presents an efficient protocol for securely computing the fundamental problem of {\em pattern matching}. This problem is defined in the two-party setting, where party P1 holds a pattern and party P2 holds a text. The goal of P1 is to learn where the pattern appears in the text, without revealing it to P2 or learning anything else about P2's text. Our protocol is the first to address this problem with full security in the face of malicious adversaries. The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem, party P1 holds an automaton and party P2 holds an input string, and they need to decide if the automaton accepts the input, without learning anything else.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Full version of a PKC 2010 paper
Keywords
text searchmalicious adversarysimulation based security
Contact author(s)
carmit hazay @ gmail com
History
2014-08-06: last of 2 revisions
2010-09-15: received
See all versions
Short URL
https://ia.cr/2010/484
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.