2006
DOI: 10.1007/0-387-33406-8_43
|View full text |Cite
|
Sign up to set email alerts
|

Practical Private Regular Expression Matching

Abstract: Abstract. Regular expressions are a frequently used tool to search in large texts. They provide the ability to compare against a structured pattern that can match many text strings and are common to many applications, even programming languages. This paper extends the problem to the private two-party setting where one party has the text string and the other party has the regular expression. The privacy constraint is that neither party should learn about the input of the other party, i.e. the string or the regu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…The second broad class of approaches is protocol-based, requiring multiple rounds of communication where data is sent back-and-forth between the host that is requesting computation, and the third party server performing the bulk of computation. Methods like Secure Multi-party Com-putation (SMC) (Kerschbaum, 2006;Du & Atallah, 2001) and other "protocols" are developed on top of "Oblivious Transfer" (OT), a primitive by which a sender and receiver exchange messages (Rabin, 1981). Many OT protocols 3 have been customized for deep learning applications (Riazi et al, 2018;Rouhani et al, 2018;Chandran et al, 2019;Riazi et al, 2019;Liu et al, 2017;Mohassel & Zhang, 2017), but suffer similar limitations to FHE.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The second broad class of approaches is protocol-based, requiring multiple rounds of communication where data is sent back-and-forth between the host that is requesting computation, and the third party server performing the bulk of computation. Methods like Secure Multi-party Com-putation (SMC) (Kerschbaum, 2006;Du & Atallah, 2001) and other "protocols" are developed on top of "Oblivious Transfer" (OT), a primitive by which a sender and receiver exchange messages (Rabin, 1981). Many OT protocols 3 have been customized for deep learning applications (Riazi et al, 2018;Rouhani et al, 2018;Chandran et al, 2019;Riazi et al, 2019;Liu et al, 2017;Mohassel & Zhang, 2017), but suffer similar limitations to FHE.…”
Section: Related Workmentioning
confidence: 99%
“…The current solutions to this situation naturally come from the encryption community, and the tools of Secure Multiparty Computation (SMC) (Kerschbaum, 2006;Du & Atallah, 2001) and Homomorphic Encryption (HE) (Gilad-Bachrach et al, 2016) provide methods for running programs on untrusted hardware that guarantee the privacy of the results. These are valuable tools, but computationally demanding and limiting.…”
Section: Introductionmentioning
confidence: 99%