Paper 2014/662
Outsourced Pattern Matching
Sebastian Faust, Carmit Hazay, and Daniele Venturi
Abstract
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their computation and data to an untrusted server in the cloud. While most earlier work considers the general question of how to securely outsource any computation to the cloud server, we focus on concrete and important functionalities and give the first protocol for the pattern matching problem in the cloud.
Loosely speaking, this problem considers a text
Note: Simplified protocol for malicious setting.
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Major revision. ICALP 2011
- Keywords
- pattern matchingdelegatable computationsimulation-based security
- Contact author(s)
- venturi @ di uniroma1 it
- History
- 2015-04-30: revised
- 2014-08-28: received
- See all versions
- Short URL
- https://ia.cr/2014/662
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/662, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced Pattern Matching}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/662}, year = {2014}, url = {https://eprint.iacr.org/2014/662} }