Back to Results
First PageMeta Content
RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols


An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗
Add to Reading List

Document Date: 2013-02-05 01:02:43


Open Document

File Size: 241,68 KB

Share Result on Facebook

City

Perm / /

Company

Bayer / Gq / BBC / Groth / /

Country

Israel / Denmark / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Bar-Ilan University / Aarhus University / /

IndustryTerm

public-coin protocol / secure protocols / recent protocol / art solutions / recent solution / Σ-protocol / semi-honest protocol / polynomial-time algorithm / data mining / above solution / important tool / exhaustive search / present secure solutions / Σ-protocols / secure function evaluation protocol / basic protocol / potential applications / polynomial-time algorithms / secure solution / analogue solution / present specific protocols / search word / Generic protocols / additive / generation protocol / paper presents protocols / computing / fundamental search problem / text processing / /

Organization

Pi / Aarhus University / Bar-Ilan University / Department of Engineering / Department of Computer Science / /

Person

Tomas Toft / /

Position

researcher / /

Product

LP11 / HL10 / GHS10 / Dec0 / /

RadioStation

Katz / /

Technology

resulting protocols / secure function evaluation protocol / polynomial-time algorithms / key generation protocol / secret key / KMP algorithm / 2.3 Public Key Encryption / paper presents protocols / generic secure two-party protocols / public key encryption / encryption / additive homomorphic encryption / proposed protocols / PPT algorithm / public key / basic protocol / polynomial-time algorithm / data mining / 3-round public-coin protocol / semi-honest protocol / simulation / recent protocol / present specific protocols / /

SocialTag