Secure and privacy-preserving pattern matching in outsourced computing

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Nowaday, secure cloud computation has become more and more attractive. We propose a protocol for privacy-preserving pattern matching. Then, we prove that the construction is simulation-based secure in the semi-honest setting. Finally, the efficiency analysis shows our scheme outperforms the previous works. Specially, compared with Fast' protocol our scheme is more efficient and the text owner does not need real-time online in the query phase. Thus, this protocol is flexible to query by light weight equipments such as mobile phones.

Original languageEnglish
Pages (from-to)3444-3451
Number of pages8
JournalSecurity and Communication Networks
Volume9
Issue number16
DOIs
StatePublished - 10 Nov 2016

Keywords

  • outsourcing
  • pattern matching
  • privacy preserving
  • semi-honest adversary

Fingerprint

Dive into the research topics of 'Secure and privacy-preserving pattern matching in outsourced computing'. Together they form a unique fingerprint.

Cite this