2020
DOI: 10.1007/978-3-030-64834-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Pattern Matching on Encrypted Data

Abstract: Pattern matching is one of the most fundamental and important paradigms in several application domains such as digital forensics, cyber threat intelligence, or genomic and medical data analysis. While it is a straightforward operation when performed on plaintext data, it becomes a challenging task when the privacy of both the analyzed data and the analysis patterns must be preserved. In this paper, we propose new provably correct, secure, and relatively efficient (compared to similar existing schemes) public a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
26
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(27 citation statements)
references
References 21 publications
0
26
1
Order By: Relevance
“…Very recently, [3] addresses some of the problems above by introducing a fragmentation approach that consists in splitting the stream into non-overlapping fragments F h and into other non-overlapping fragments F h that straddle the former. This technique will be explained in more details in Section 4.1 but intuitively this is done in such a way that any searched pattern is entirely contained by a fragment F h or F h .…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Very recently, [3] addresses some of the problems above by introducing a fragmentation approach that consists in splitting the stream into non-overlapping fragments F h and into other non-overlapping fragments F h that straddle the former. This technique will be explained in more details in Section 4.1 but intuitively this is done in such a way that any searched pattern is entirely contained by a fragment F h or F h .…”
Section: Related Workmentioning
confidence: 99%
“…Based on this fragmentation approach, the authors of [3] propose a construction that allows to test the presence of one pattern at one position for a constant cost of 2 pairings. Moreover the dependency of the public key on the length of the string is replaced by a fixed upper bound on the length of the keywords to be searched, which is indeed much smaller in the context of DPI.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations