Filters








32,600 Hits in 2.9 sec

Text Search Protocols with Simulation Based Security [chapter]

Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
2010 Lecture Notes in Computer Science  
Our protocol is the first to address this problem with full security in the face of malicious adversaries.  ...  The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest.  ...  Text Search Protocol with Simulation Based Security In this section we present our complete and main construction for securely evaluating the pattern matching functionality F PM defined by (p, (T, m))  ... 
doi:10.1007/978-3-642-13013-7_20 fatcat:ifdo2qgyzzezbhgygf2vw3xk4q

Automata Evaluation and Text Search Protocols with Simulation-Based Security

Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
2015 Journal of Cryptology  
The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest.  ...  Our protocol is the first to address this problem with full security in the face of malicious adversaries.  ...  Text Search Protocol with Simulation Based Security In this section we present our complete and main construction for securely evaluating the pattern matching functionality F PM defined by (p, (T, m))  ... 
doi:10.1007/s00145-014-9193-x fatcat:tp7eij4dmjfurdfffnplyyqbwi

Outsourced pattern matching

Sebastian Faust, Carmit Hazay, Daniele Venturi
2017 International Journal of Information Security  
. , C l run an efficient protocol with the server S and the client CT in order to learn the positions at which a pattern of length m matches the text (and nothing beyond that).  ...  Our constructions offer simulation-based security in the presence of semi-honest and malicious adversaries (in the random oracle model) and limit the communication in the query phase to O(m) bits plus  ...  Simulation-based security: We model outsourced pattern matching by a strong simulation-based security definition (cf. Section 2).  ... 
doi:10.1007/s10207-017-0374-0 fatcat:gw6h35xrdfhkzayl4dg3kwykta

Outsourced Pattern Matching [chapter]

Sebastian Faust, Carmit Hazay, Daniele Venturi
2013 Lecture Notes in Computer Science  
. , C l run an efficient protocol with the server S and the client CT in order to learn the positions at which a pattern of length m matches the text (and nothing beyond that).  ...  Our constructions offer simulation-based security in the presence of semi-honest and malicious adversaries (in the random oracle model) and limit the communication in the query phase to O(m) bits plus  ...  Simulation-based security: We model outsourced pattern matching by a strong simulation-based security definition (cf. Section 2).  ... 
doi:10.1007/978-3-642-39212-2_48 fatcat:zwx6xfya5bc25ipvxd57ovyiaq

Secure text processing with applications to private DNA matching

Jonathan Katz, Lior Malka
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
We aim for protocols with full security against a malicious P2 that also preserve privacy against a malicious P 1 (i.e., one-sided security).  ...  Motivated by the problem of private DNA matching, we consider the design of efficient protocols for secure text processing.  ...  Figure 3 : A protocol for secure text processing. P2 obtains output.)  ... 
doi:10.1145/1866307.1866361 dblp:conf/ccs/KatzM10 fatcat:klbxaw6u35bq5btj3nn3nrzbni

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

Mikhail Strizhov, Zachary Osman, Indrajit Ray
2016 Future Internet  
In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap.  ...  We prove that the proposed scheme is secure against chosen-query attacks that involve an adaptive adversary.  ...  -With given search requests ( x 1 , . . . , x h ), the simulator performs a search in simulated array X and returns matching elements ( X 1 , . . . , X h ).  ... 
doi:10.3390/fi8030028 fatcat:5c4lrleskvfkvcwk3eqc2rvnru

A Group-Based Key Management Protocol for Mobile Ad Hoc Networks

Qing Chen, Xiaodong Lin, Sherman Shen, Kazuo Hashimoto, Nei Kato
2009 GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference  
Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed.  ...  Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets.  ...  Simulation Setup We implement our protocol in the QualNet simulator [17] . The objective is to evaluate the performance of proposed key management protocol.  ... 
doi:10.1109/glocom.2009.5425805 dblp:conf/globecom/ChenLSHK09 fatcat:7pes7cfgineqliuey3hkof7qyi

Privacy-preserving wildcards pattern matching protocol for IoT applications

Hong Qin, Hao Wang, Xiaochao Wei, Likun Xue, Lei Wu
2019 IEEE Access  
In addition, our protocol also supports query with wildcards which can be used for the batch search. This protocol is provable-secure against honest-but-curious adversaries.  ...  In this paper, we propose a new protocol using secret sharing and oblivious transfer (OT) and latter improve its efficiency with OT extension, so it is very efficient for lightweight IoT devices.  ...  In the following, we present formal security proof of protocol π WPM based on security definition in previous section.  ... 
doi:10.1109/access.2019.2900519 fatcat:gylkehwmpjgyvbawes3odz4gci

Simulation framework for connected vehicles: a scoping review

Siti Fatimah Abdul Razak, Sumendra Yogarayan, Afizan Azman, Mohd Fikri Azli Abdullah, Anang Hudaya Muhamad Amin, Mazzar Salleh
2021 F1000Research  
Most researchers rely on vehicular simulation tools to model traffic and road conditions and evaluate the performance of network protocols.  ...  V2V (Vehicle-to-Vehicle) is a booming research field with a diverse set of services and applications.  ...  Although various simulators can be enhanced with library extensions, none of the simulators is related to security and privacy.  ... 
doi:10.12688/f1000research.73398.1 fatcat:3iw63qbaqbe3fh5akz723v4knu

The Feasibility of Outsourced Database Search in the Plain Model [chapter]

Carmit Hazay, Hila Zarosim
2016 Lecture Notes in Computer Science  
The problem of securely outsourcing computation to an untrusted server gained momentum with the recent penetration of cloud computing services.  ...  We study whether a trusted setup or a random oracle are necessary for protocols with minimal interaction that meet the optimal communication and computation bounds in the query phase.  ...  By the security of the protocol this must also hold in the simulation.  ... 
doi:10.1007/978-3-319-44618-9_17 fatcat:gxdaxdnrl5hbvougbauzmmrte4

Towards Privacy-Preserving XML Transformation

Meiko Jensen, Florian Kerschbaum
2011 2011 IEEE International Conference on Web Services  
String Search The string search protocol searches a shared string X for a pattern string P. In this protocol the output is known to both parties and not shared.  ...  In order to complete the proof we need to prove the security of the "substring with remainder" and the "masking" protocol. Substring Protocol with Remainder Bytes.  ... 
doi:10.1109/icws.2011.10 dblp:conf/icws/JensenK11 fatcat:ujbgkvdqlfgybh7x7bfvq2wyyu

Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search for Bioinformatics

Hiroki Sudo, Masanobu Jimbo, Koji Nuida, Kana Shimizu
2018 IEEE/ACM Transactions on Computational Biology & Bioinformatics  
We consider a case in which a server has a text database and a user searches the database to find substring matches.  ...  The previous approach for this problem is based on a linear-time algorithm in terms of alphabet size jSj, and it cannot search on the database of large alphabet such as biomedical documents.  ...  The similar protocol is also introduced as a primitive for searching with a finite automata [26] , [27] . Secure Wavelet Matrix Here, we describe the algorithm of sWM in detail.  ... 
doi:10.1109/tcbb.2018.2814039 pmid:29994070 fatcat:rjvypashgbfhlav5utlzsb5vcm

Improvement of Performance Metrics and Security of AODV Routing Protocol using Central Dogma of Molecular Biology Based DNA Cryptography

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this approach, we simulate the central dogma's transcription and translation process, and even some extra features to make it difficult to crack the resulting ciphertext and defense against wormhole  ...  Mobile ad hoc network provides several well-known protocols for routing responsive like DSR, AODV, TORA, etc. AODV can route both unicast and multicast.  ...  Secure On-Demand Distance Vector Routing is a secure routing technique with high efficiency this helps to improve in AODV [9] [16] protocol.  ... 
doi:10.35940/ijitee.d2075.029420 fatcat:j6cfzajjb5cq5gigd7tcx4ogaq

Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks

A.A. Adas A.A. Adas
2017 journal of King Abdulaziz University Engineering Sciences  
We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator.  ...  Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.  ...  Simplicity of design: The cipher text does not base of security and also not well understood interactions between arithmetic operations. 2.  ... 
doi:10.4197/eng.28-1.3 fatcat:pysbzyxy5vfzrguxnicem7en3u

Advanced Metering Infrastructure with Secure Chord Lookup Protocol for IoT Systems

Karrupusamy P
2021 Journal of Electrical Engineering and Automation  
The advanced metering infrastructure is enhanced in terms of system storage and latency using a secure chord lookup protocol scheme.  ...  Lightweight authentication based secure mechanism is also provided to improve the safety of the model.  ...  Along with text encryption, homomorphic operation is also performed by this scheme with the help of a secure chord lookup protocol.  ... 
doi:10.36548/jeea.2020.3.001 fatcat:imr53ht3ozdanitfzwlnzynvsm
« Previous Showing results 1 — 15 out of 32,600 results