Paper 2012/698
5PM: Secure Pattern Matching
Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, and Eric Tressler
Abstract
In this paper we consider the problem of secure pattern matching that allows
single-character wildcards and substring matching in the malicious (stand-alone) setting.
Our protocol, called 5PM, is executed between
two parties: Server, holding a text of length
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Preliminary version at SCN 2012. This is the full version.
- Keywords
- Secure pattern matchingwildcard pattern matchingsubstring pattern matchingnon-binary Hamming distancesecure two-party computationmalicious adversaryfull simulationhomomorphic encryptionthreshold encryption
- Contact author(s)
- jwbaron @ hrl com
- History
- 2013-07-01: last of 2 revisions
- 2012-12-14: received
- See all versions
- Short URL
- https://ia.cr/2012/698
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/698, author = {Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler}, title = {{5PM}: Secure Pattern Matching}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/698}, year = {2012}, url = {https://eprint.iacr.org/2012/698} }