2005
DOI: 10.1007/978-3-540-30576-7_17
|View full text |Cite
|
Sign up to set email alerts
|

Keyword Search and Oblivious Pseudorandom Functions

Abstract: Abstract. We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are accessed according to their associated keywords and where we care for the privacy of both the client and the server. We provide efficient solutions for various settings of KS, based either on specific assumptions or on general primitives (mainly oblivious transfer). Our general solutions rely on a new connection between KS … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
219
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 303 publications
(219 citation statements)
references
References 26 publications
0
219
0
Order By: Relevance
“…In the exact pattern matching setting, the algorithm of Freedman, Ishai, Pinkas and Reingold [13] achieves polylogarithmic overhead in m and n and polynomial overhead in security parameters in the honest-but-curious setting. Using efficient arguments [17,18] with the modern probabilistically checkable proofs (PCPs) of proximity [19], one can extend (at least asymptotically) their results to the malicious (static corruption) model.…”
Section: Comparison To Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In the exact pattern matching setting, the algorithm of Freedman, Ishai, Pinkas and Reingold [13] achieves polylogarithmic overhead in m and n and polynomial overhead in security parameters in the honest-but-curious setting. Using efficient arguments [17,18] with the modern probabilistically checkable proofs (PCPs) of proximity [19], one can extend (at least asymptotically) their results to the malicious (static corruption) model.…”
Section: Comparison To Previous Workmentioning
confidence: 99%
“…Using efficient arguments [17,18] with the modern probabilistically checkable proofs (PCPs) of proximity [19], one can extend (at least asymptotically) their results to the malicious (static corruption) model. However, the protocol in [13] works only for exact matching and does not address more general problems, including singlecharacter wildcards and substring matching, which are the main focus of our work. Other protocols that address secure exact matching (and not wildcard or substring matching) are [12,20,21,22,23,11]; of these, only [22] obtains (full) security in the malicious setting.…”
Section: Comparison To Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It also appears likely to us that suitable VRFs could be a useful alternative in several applications which, as part of the system, output the value of the PRF together with a proof (interactive or non-interactive) that the evaluation was correct and has some additional properties. Examples of this include compact e-cash [11], keyword search [15], set intersection protocols [19], and adaptive oblivious transfer protocols [21].…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation is oblivious in the sense that the party holding the key k does not learn x, while the other party only obtains FPRF(k, x) and has no knowledge of k [18], [19], [20].…”
Section: Oblivious Pseudo-random Function Evaluation (Oprf)mentioning
confidence: 99%