Abstract
Nowaday, secure cloud computation has become more and more attractive. We propose a protocol for privacy-preserving pattern matching. Then, we prove that the construction is simulation-based secure in the semi-honest setting. Finally, the efficiency analysis shows our scheme outperforms the previous works. Specially, compared with Fast' protocol our scheme is more efficient and the text owner does not need real-time online in the query phase. Thus, this protocol is flexible to query by light weight equipments such as mobile phones.
| Original language | English |
|---|---|
| Pages (from-to) | 3444-3451 |
| Number of pages | 8 |
| Journal | Security and Communication Networks |
| Volume | 9 |
| Issue number | 16 |
| DOIs | |
| State | Published - 10 Nov 2016 |
Keywords
- outsourcing
- pattern matching
- privacy preserving
- semi-honest adversary