A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Text Search Protocols with Simulation Based Security
[chapter]
2010
Lecture Notes in Computer Science
Our protocol is the first to address this problem with full security in the face of malicious adversaries. ...
The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. ...
Text Search Protocol with Simulation Based Security In this section we present our complete and main construction for securely evaluating the pattern matching functionality F PM defined by (p, (T, m)) ...
doi:10.1007/978-3-642-13013-7_20
fatcat:ifdo2qgyzzezbhgygf2vw3xk4q
Automata Evaluation and Text Search Protocols with Simulation-Based Security
2015
Journal of Cryptology
The construction is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. ...
Our protocol is the first to address this problem with full security in the face of malicious adversaries. ...
Text Search Protocol with Simulation Based Security In this section we present our complete and main construction for securely evaluating the pattern matching functionality F PM defined by (p, (T, m)) ...
doi:10.1007/s00145-014-9193-x
fatcat:tp7eij4dmjfurdfffnplyyqbwi
Outsourced pattern matching
2017
International Journal of Information Security
. , C l run an efficient protocol with the server S and the client CT in order to learn the positions at which a pattern of length m matches the text (and nothing beyond that). ...
Our constructions offer simulation-based security in the presence of semi-honest and malicious adversaries (in the random oracle model) and limit the communication in the query phase to O(m) bits plus ...
Simulation-based security: We model outsourced pattern matching by a strong simulation-based security definition (cf. Section 2). ...
doi:10.1007/s10207-017-0374-0
fatcat:gw6h35xrdfhkzayl4dg3kwykta
Outsourced Pattern Matching
[chapter]
2013
Lecture Notes in Computer Science
. , C l run an efficient protocol with the server S and the client CT in order to learn the positions at which a pattern of length m matches the text (and nothing beyond that). ...
Our constructions offer simulation-based security in the presence of semi-honest and malicious adversaries (in the random oracle model) and limit the communication in the query phase to O(m) bits plus ...
Simulation-based security: We model outsourced pattern matching by a strong simulation-based security definition (cf. Section 2). ...
doi:10.1007/978-3-642-39212-2_48
fatcat:zwx6xfya5bc25ipvxd57ovyiaq
Secure text processing with applications to private DNA matching
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
We aim for protocols with full security against a malicious P2 that also preserve privacy against a malicious P 1 (i.e., one-sided security). ...
Motivated by the problem of private DNA matching, we consider the design of efficient protocols for secure text processing. ...
Figure 3 : A protocol for secure text processing. P2 obtains output.) ...
doi:10.1145/1866307.1866361
dblp:conf/ccs/KatzM10
fatcat:klbxaw6u35bq5btj3nn3nrzbni
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
2016
Future Internet
In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. ...
We prove that the proposed scheme is secure against chosen-query attacks that involve an adaptive adversary. ...
-With given search requests ( x 1 , . . . , x h ), the simulator performs a search in simulated array X and returns matching elements ( X 1 , . . . , X h ). ...
doi:10.3390/fi8030028
fatcat:5c4lrleskvfkvcwk3eqc2rvnru
A Group-Based Key Management Protocol for Mobile Ad Hoc Networks
2009
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed. ...
Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. ...
Simulation Setup We implement our protocol in the QualNet simulator [17] . The objective is to evaluate the performance of proposed key management protocol. ...
doi:10.1109/glocom.2009.5425805
dblp:conf/globecom/ChenLSHK09
fatcat:7pes7cfgineqliuey3hkof7qyi
Privacy-preserving wildcards pattern matching protocol for IoT applications
2019
IEEE Access
In addition, our protocol also supports query with wildcards which can be used for the batch search. This protocol is provable-secure against honest-but-curious adversaries. ...
In this paper, we propose a new protocol using secret sharing and oblivious transfer (OT) and latter improve its efficiency with OT extension, so it is very efficient for lightweight IoT devices. ...
In the following, we present formal security proof of protocol π WPM based on security definition in previous section. ...
doi:10.1109/access.2019.2900519
fatcat:gylkehwmpjgyvbawes3odz4gci
Simulation framework for connected vehicles: a scoping review
2021
F1000Research
Most researchers rely on vehicular simulation tools to model traffic and road conditions and evaluate the performance of network protocols. ...
V2V (Vehicle-to-Vehicle) is a booming research field with a diverse set of services and applications. ...
Although various simulators can be enhanced with library extensions, none of the simulators is related to security and privacy. ...
doi:10.12688/f1000research.73398.1
fatcat:3iw63qbaqbe3fh5akz723v4knu
The Feasibility of Outsourced Database Search in the Plain Model
[chapter]
2016
Lecture Notes in Computer Science
The problem of securely outsourcing computation to an untrusted server gained momentum with the recent penetration of cloud computing services. ...
We study whether a trusted setup or a random oracle are necessary for protocols with minimal interaction that meet the optimal communication and computation bounds in the query phase. ...
By the security of the protocol this must also hold in the simulation. ...
doi:10.1007/978-3-319-44618-9_17
fatcat:gxdaxdnrl5hbvougbauzmmrte4
Towards Privacy-Preserving XML Transformation
2011
2011 IEEE International Conference on Web Services
String Search The string search protocol searches a shared string X for a pattern string P. In this protocol the output is known to both parties and not shared. ...
In order to complete the proof we need to prove the security of the "substring with remainder" and the "masking" protocol. Substring Protocol with Remainder Bytes. ...
doi:10.1109/icws.2011.10
dblp:conf/icws/JensenK11
fatcat:ujbgkvdqlfgybh7x7bfvq2wyyu
Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search for Bioinformatics
2018
IEEE/ACM Transactions on Computational Biology & Bioinformatics
We consider a case in which a server has a text database and a user searches the database to find substring matches. ...
The previous approach for this problem is based on a linear-time algorithm in terms of alphabet size jSj, and it cannot search on the database of large alphabet such as biomedical documents. ...
The similar protocol is also introduced as a primitive for searching with a finite automata [26] , [27] .
Secure Wavelet Matrix Here, we describe the algorithm of sWM in detail. ...
doi:10.1109/tcbb.2018.2814039
pmid:29994070
fatcat:rjvypashgbfhlav5utlzsb5vcm
Improvement of Performance Metrics and Security of AODV Routing Protocol using Central Dogma of Molecular Biology Based DNA Cryptography
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In this approach, we simulate the central dogma's transcription and translation process, and even some extra features to make it difficult to crack the resulting ciphertext and defense against wormhole ...
Mobile ad hoc network provides several well-known protocols for routing responsive like DSR, AODV, TORA, etc. AODV can route both unicast and multicast. ...
Secure On-Demand Distance Vector Routing is a secure routing technique with high efficiency this helps to improve in AODV [9] [16] protocol. ...
doi:10.35940/ijitee.d2075.029420
fatcat:j6cfzajjb5cq5gigd7tcx4ogaq
Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks
2017
journal of King Abdulaziz University Engineering Sciences
We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. ...
Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay. ...
Simplicity of design: The cipher text does not base of security and also not well understood interactions between arithmetic operations. 2. ...
doi:10.4197/eng.28-1.3
fatcat:pysbzyxy5vfzrguxnicem7en3u
Advanced Metering Infrastructure with Secure Chord Lookup Protocol for IoT Systems
2021
Journal of Electrical Engineering and Automation
The advanced metering infrastructure is enhanced in terms of system storage and latency using a secure chord lookup protocol scheme. ...
Lightweight authentication based secure mechanism is also provided to improve the safety of the model. ...
Along with text encryption, homomorphic operation is also performed by this scheme with the help of a secure chord lookup protocol. ...
doi:10.36548/jeea.2020.3.001
fatcat:imr53ht3ozdanitfzwlnzynvsm
« Previous
Showing results 1 — 15 out of 32,600 results