Theory of Cryptography
DOI: 10.1007/978-3-540-78524-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

Abstract: In this paper we construct efficient secure protocols for set intersection and pattern matching. Our protocols for securely computing the set intersection functionality are based on secure pseudorandom function evaluations, in contrast to previous protocols that used secure polynomial evaluation. In addition to the above, we also use secure pseudorandom function evaluation in order to achieve secure pattern matching. In this case, we utilize specific properties of the Naor-Reingold pseudorandom function in ord… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
94
0

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 170 publications
(95 citation statements)
references
References 27 publications
(38 reference statements)
1
94
0
Order By: Relevance
“…However, the protocol in [13] works only for exact matching and does not address more general problems, including singlecharacter wildcards and substring matching, which are the main focus of our work. Other protocols that address secure exact matching (and not wildcard or substring matching) are [12,20,21,22,23,11]; of these, only [22] obtains (full) security in the malicious setting. We note that [23] is more efficient than [13], but only in the random oracle model; here, we are interested in standard security models.…”
Section: Comparison To Previous Workmentioning
confidence: 99%
“…However, the protocol in [13] works only for exact matching and does not address more general problems, including singlecharacter wildcards and substring matching, which are the main focus of our work. Other protocols that address secure exact matching (and not wildcard or substring matching) are [12,20,21,22,23,11]; of these, only [22] obtains (full) security in the malicious setting. We note that [23] is more efficient than [13], but only in the random oracle model; here, we are interested in standard security models.…”
Section: Comparison To Previous Workmentioning
confidence: 99%
“…It also appears likely to us that suitable VRFs could be a useful alternative in several applications which, as part of the system, output the value of the PRF together with a proof (interactive or non-interactive) that the evaluation was correct and has some additional properties. Examples of this include compact e-cash [11], keyword search [15], set intersection protocols [19], and adaptive oblivious transfer protocols [21].…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation is oblivious in the sense that the party holding the key k does not learn x, while the other party only obtains FPRF(k, x) and has no knowledge of k [18], [19], [20].…”
Section: Oblivious Pseudo-random Function Evaluation (Oprf)mentioning
confidence: 99%