Privacy-preserving protocols for string matching
Paper
Paper/Presentation Title | Privacy-preserving protocols for string matching |
---|---|
Presentation Type | Paper |
Authors | Luo, Yonglong (Author), Shi, Lei (Author), Zhang, Caiyun (Author) and Zhang, Ji (Author) |
Editors | Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza |
Journal or Proceedings Title | Proceedings of the 4th International Conference on Network and System Security (NSS 2010) |
ERA Conference ID | 43468 |
Number of Pages | 5 |
Year | 2010 |
Place of Publication | Piscataway, NJ. United States |
ISBN | 9780769541594 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/NSS.2010.24 |
Conference/Event | NSS 2010: 4th International Conference on Network and System Security |
International Conference on network and System Security | |
Event Details | International Conference on network and System Security NSS Rank B B B B B B |
Event Details | NSS 2010: 4th International Conference on Network and System Security Parent International Conference on network and System Security Delivery In person Event Date 01 to end of 03 Sep 2010 Event Location Melbourne, Australia |
Abstract | String matching is a basic problem of string operation, and privacy-preserving string matching, as a special case of secure multi-party computation, has broad applications in auction, bidding and some other commercial areas. In this paper, some protocols are proposed to solve this private matching problem, the security and correctness are analyzed respectively, and the actual efficiency is tested by experiment. A protocol is also designed based on the BMH algorithm which is more efficient and conceals more private information. |
Keywords | computer security; information security; privacy |
ANZSRC Field of Research 2020 | 469999. Other information and computing sciences not elsewhere classified |
400607. Signal processing | |
460499. Cybersecurity and privacy not elsewhere classified | |
Public Notes | © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Byline Affiliations | Anhui Normal University, China |
Department of Mathematics and Computing | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q073q/privacy-preserving-protocols-for-string-matching
Download files
1919
total views709
total downloads1
views this month0
downloads this month