Text search protocols with simulation based security
From MaRDI portal
Publication:3562906
Recommendations
- Automata evaluation and text search protocols with simulation-based security
- Computationally secure pattern matching in the presence of malicious adversaries
- Computationally secure pattern matching in the presence of malicious adversaries
- Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
- Efficient and secure generalized pattern matching via Fast Fourier Transform
Cited in
(13)- Secure parameterized pattern matching
- Automata evaluation and text search protocols with simulation-based security
- Oblivious DFA evaluation on joint input and its applications
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Computationally secure pattern matching in the presence of malicious adversaries
- Computationally secure pattern matching in the presence of malicious adversaries
- Rate-limited secure function evaluation
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Efficient and secure outsourced approximate pattern matching protocol
- Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
- An efficient protocol for oblivious DFA evaluation and applications
- Rate-limited secure function evaluation: definitions and constructions
- Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
This page was built for publication: Text search protocols with simulation based security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562906)