2021
DOI: 10.1007/978-3-030-92068-5_12
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Encryption with Flexible Pattern Matching

Abstract: Many interesting applications of pattern matching (e.g. deeppacket inspection or medical data analysis) target very sensitive data. In particular, spotting illegal behaviour in internet traffic conflicts with legitimate privacy requirements, which usually forces users (e.g. children, employees) to blindly trust an entity that fully decrypts their traffic in the name of security. The compromise between traffic analysis and privacy can be achieved through searchable encryption. However, as the traffic data is a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Further advancements were made in 2023 by Zhao et al [4] who introduced attribute-based searchable encryption for multi-user scenarios. Simultaneously, other researchers have also extended and enhanced the functionality and security of searchable encryption schemes [5][6][7][8][9][10][11][12]. In the SE system, key management has always been a thorny issue for users.…”
Section: Introductionmentioning
confidence: 99%
“…Further advancements were made in 2023 by Zhao et al [4] who introduced attribute-based searchable encryption for multi-user scenarios. Simultaneously, other researchers have also extended and enhanced the functionality and security of searchable encryption schemes [5][6][7][8][9][10][11][12]. In the SE system, key management has always been a thorny issue for users.…”
Section: Introductionmentioning
confidence: 99%
“…Initially proposed by Abdalla et al [2], a line of work improved the security guarantees [3,13,15,16,24], extended it to the multi-input [8,12] as well as the decentralized setting [4][5][6]22,46]. Although this functionality is very simple, it has already shown to be useful in privacy-preserving machine learning [49], money-laundering detection [31], search in encrypted data streams [18], video data analytics, 2 or data marketplaces [43]. Limitations of large-scale deployment of FE A problem for the practical adoption of FE is that every issued functional decryption key inherently leaks some information.…”
Section: Introductionmentioning
confidence: 99%