2009
DOI: 10.1145/1455526.1455529
|View full text |Cite
|
Sign up to set email alerts
|

New Techniques for Private Stream Searching

Abstract: A system for private stream searching, introduced by Ostrovsky and Skeith, allows a client to provide an untrusted server with an encrypted search query. The server uses the query on a stream of documents and returns the matching documents to the client while learning nothing about the nature of the query. We present a new scheme for conducting private keyword search on streaming data which requires O ( m ) server to client communication complexity to return the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(32 citation statements)
references
References 13 publications
0
31
0
Order By: Relevance
“…Constructions in these settings support efficient equality testing [OS07,BSW09] and can be viewed as a more expressive variant of private information retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…Constructions in these settings support efficient equality testing [OS07,BSW09] and can be viewed as a more expressive variant of private information retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme in [15] has a somewhat different setting from the proposed scheme, in the sense that servers can access the data while the search keywords are hidden from the servers. In the proposed scheme, both the search keywords and data are regarded as sensitive information, and therefore they are encrypted.…”
Section: Other Related Work On Database Securitymentioning
confidence: 99%
“…In the proposed scheme, both the search keywords and data are regarded as sensitive information, and therefore they are encrypted. Also, [15] is based on Paillier's homomorphic cryptosystem in [16]. This is a public key cryptosystem, and therefore it takes more resources than a symmetric cryptosystem.…”
Section: Other Related Work On Database Securitymentioning
confidence: 99%
“…Many applications have been found ranging from time-stamping schemes [20], search on encrypted data [4,13] to data aggregation in sensor networks [19] and distillation codes [16] among others. For instance, Sander et al [26] use RSA accumulator to design blind and auditable membership proof scheme in the context of e-cash.…”
Section: Introductionmentioning
confidence: 99%