Back to Results
First PageMeta Content
Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols


An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗
Add to Reading List

Document Date: 2014-07-21 08:57:56


Open Document

File Size: 522,92 KB

Share Result on Facebook

Company

Google / /

Country

Israel / /

Currency

pence / /

/

Event

FDA Phase / Bankruptcy / /

Facility

Bar-Ilan University / City College of New York / /

IndustryTerm

secure protocols / constant round protocol / sub-protocols / text search / Secure text search / trusted party computing f1 / simulation solution / communication protocol / real-model protocol / honest-but-curious secure protocol / text search algorithms / Recent applications / pattern matching protocol / simulation protocol / honest-but-curious solutions / basic protocol / potential applications / polynomial-time algorithms / presented solutions / secure multi-party protocol / secure protocol / Generic protocols / approximate text search / computing / larger protocol / binary solutions / text processing / /

Organization

Pi / Bar-Ilan University / Faculty of Engineering / P1 and O / P2 / Center for Algorithms / P1 / City College of New York / /

Person

Rosario Gennaro∗ Carmit Hazay / /

Position

following IND-CPA / researcher / IND-CPA / /

Product

This solution / A2 / HT10 / Our solution / their / P1 / This / Their solution / LP11 / A1 / Lin13 / HL09 / our / KMP77 / /

ProvinceOrState

New York / /

Technology

two-party protocol / generic two-party constant round protocol / polynomial-time algorithms / real protocol / Earlier text search algorithms / pattern matching protocol / secret key / encryption / additive homomorphic encryption / one-sided simulation protocol / larger protocol / secure multi-party protocol / public-key encryption / real-model protocol / basic protocol / improved protocol / communication protocol / Simulation / specified protocol / secure protocol / honest-but-curious secure protocol / 2.6 Public-Key Encryption / /

SocialTag