5PM: secure pattern matching
DOI10.1007/978-3-642-32928-9_13zbMATH Open1365.68503OpenAlexW1798619551MaRDI QIDQ2912798FDOQ2912798
Authors: Joshua Baron, Karim Eldefrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32928-9_13
Recommendations
- Computationally secure pattern matching in the presence of malicious adversaries
- Computationally secure pattern matching in the presence of malicious adversaries
- SWiM: secure wildcard pattern matching from OT extension
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Automata evaluation and text search protocols with simulation-based security
homomorphic encryptionsecure two-party computationmalicious adversarywildcard pattern matchingsubstring pattern matchingsecure pattern matchingthreshold encryptionfull simulationnon-binary Hamming distance
Data encryption (aspects in computer science) (68P25) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Algorithms on strings (68W32)
Cited In (16)
- Communication-Efficient Private Protocols for Longest Common Subsequence
- SWiM: secure wildcard pattern matching from OT extension
- Secure parameterized pattern matching
- Private subgraph matching protocol
- Private fingerprint matching
- Automata evaluation and text search protocols with simulation-based security
- Verifiable pattern matching on outsourced texts
- Verifiable pattern matching on outsourced texts
- Computationally secure pattern matching in the presence of malicious adversaries
- Public Key Encryption with Flexible Pattern Matching
- Computationally secure pattern matching in the presence of malicious adversaries
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Efficient and secure outsourced approximate pattern matching protocol
- Pattern matching on encrypted streams
- Outsourced pattern matching
- Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
Uses Software
This page was built for publication: 5PM: secure pattern matching
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2912798)