메뉴 건너뛰기




Volumn , Issue , 2010, Pages 485-492

Secure text processing with applications to private DNA matching

Author keywords

Security; Theory

Indexed keywords

GARBLED CIRCUITS; KEYWORD SEARCH; PATTERN MATCHING PROBLEMS; SECURITY; SUBSTRING; THEORY;

EID: 78649989154     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866361     Document Type: Conference Paper
Times cited : (65)

References (21)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • Advances in Cryptology - Eurocrypt 2001, Springer
    • W. Aiello, Y. Ishai, and O. Reingold. Priced oblivious transfer: How to sell digital goods. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 119-135. Springer, 2001.
    • (2001) LNCS , vol.2045 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 3
  • 4
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • 2nd Theory of Cryptography Conference, Springer
    • M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword search and oblivious pseudorandom functions. In 2nd Theory of Cryptography Conference, volume 3378 of LNCS, pages 303-324. Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 5
    • 70350370031 scopus 로고    scopus 로고
    • Practical private DNA string searching and matching through efficient oblivious automata evaluation
    • Data and Applications Security, Springer
    • K. Frikken. Practical private DNA string searching and matching through efficient oblivious automata evaluation. In Data and Applications Security, volume 5645 of LNCS, pages 81-94. Springer, 2009.
    • (2009) LNCS , vol.5645 , pp. 81-94
    • Frikken, K.1
  • 6
    • 78650035406 scopus 로고    scopus 로고
    • Text search protocols with simulation based security
    • 13th Intl. Conference on Theory and Practice of Public Key Cryptography (PKC 2010), Springer
    • R. Gennaro, C. Hazay, and J. S. Sorensen. Text search protocols with simulation based security. In 13th Intl. Conference on Theory and Practice of Public Key Cryptography (PKC 2010), volume 6056 of LNCS, pages 332-350. Springer, 2010.
    • (2010) LNCS , vol.6056 , pp. 332-350
    • Gennaro, R.1    Hazay, C.2    Sorensen, J.S.3
  • 9
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • 5th Theory of Cryptography Conference - TCC 2008, Springer
    • C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 155-175. Springer, 2008.
    • LNCS , vol.4948 , Issue.2008 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 10
    • 38049136533 scopus 로고    scopus 로고
    • Efficient two-party secure computation on committed inputs
    • Advances in Cryptology - Eurocrypt 2007, Springer
    • S. Jarecki and V. Shmatikov. Efficient two-party secure computation on committed inputs. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 97-114. Springer, 2007.
    • (2007) LNCS , vol.4515 , pp. 97-114
    • Jarecki, S.1    Shmatikov, V.2
  • 11
    • 50249177701 scopus 로고    scopus 로고
    • Towards practical privacy for genomic computation
    • IEEE
    • S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. In IEEE Symp. Security & Privacy, pages 216-230. IEEE, 2008.
    • (2008) IEEE Symp. Security & Privacy , pp. 216-230
    • Jha, S.1    Kruger, L.2    Shmatikov, V.3
  • 12
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Advances in Cryptology - Crypto 2005, Springer
    • L. Kissner and D. X. Song. Privacy-preserving set operations. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 241-257. Springer, 2005.
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 13
    • 43149086402 scopus 로고    scopus 로고
    • Efficient fully-simulatable oblivious transfer
    • Cryptographers' Track - RSA 2008, Springer
    • A. Lindell. Efficient fully-simulatable oblivious transfer. In Cryptographers' Track - RSA 2008, volume 4964 of LNCS, pages 52-70. Springer, 2008.
    • (2008) LNCS , vol.4964 , pp. 52-70
    • Lindell, A.1
  • 14
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Advances in Cryptology - Eurocrypt 2007, Springer
    • Y. Lindell and B. Pinkas. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 52-78. Springer, 2007.
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 15
    • 52149120767 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • 6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), Springer
    • Y. Lindell, B. Pinkas, and N. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In 6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), volume 5229 of LNCS, pages 2-20. Springer, 2008.
    • (2008) LNCS , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.3
  • 17
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18(1):1-35, 2005.
    • (2005) J. Cryptology , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 18
    • 68849099052 scopus 로고    scopus 로고
    • Practical secure evaluation of semi-private functions
    • Conf. on Applied Cryptography and Network Security, Springer
    • A. Paus, A.-R. Sadeghi, and T. Schneider. Practical secure evaluation of semi-private functions. In Conf. on Applied Cryptography and Network Security, volume 5536 of LNCS, pages 89-106. Springer, 2009.
    • (2009) LNCS , vol.5536 , pp. 89-106
    • Paus, A.1    Sadeghi, A.-R.2    Schneider, T.3
  • 19
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • Advances in Cryptology - Asiacrypt 2009, Springer
    • B. Pinkas, T. Schneider, N. Smart, and S. Williams. Secure two-party computation is practical. In Advances in Cryptology - Asiacrypt 2009, volume 5912 of LNCS, pages 250-267. Springer, 2009.
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.3    Williams, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.