A comprehensive survey on secure outsourced computation and its applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …
for local devices (with limited sources) to implement large-scale data processing. Therefore …
Secure and flexible wildcard queries
Wildcard Keyword Searchable Encryption (WKSE) enables users to search desired
encrypted files with wildcard queries. Previous schemes only enabled single-character …
encrypted files with wildcard queries. Previous schemes only enabled single-character …
PrivMail: A Privacy-Preserving Framework for Secure Emails
Emails have improved our workplace efficiency and communication. However, they are often
processed unencrypted by mail servers, leaving them open to data breaches on a single …
processed unencrypted by mail servers, leaving them open to data breaches on a single …
Private compound wildcard queries using fully homomorphic encryption
Fully homomorphic encryption (FHE) brings a paradigm shift in cryptographic engineering
by enabling us to resolve various unsolved problems. Among them, this work solves the …
by enabling us to resolve various unsolved problems. Among them, this work solves the …
Swim: Secure wildcard pattern matching from ot extension
Suppose a server holds a long text string and a receiver holds a short pattern string. Secure
pattern matching allows the receiver to learn the locations in the long text where the pattern …
pattern matching allows the receiver to learn the locations in the long text where the pattern …
Privacy-preserving wildcards pattern matching protocol for IoT applications
With the continuous development of the Internet of Things (IoT), various IoT devices create
an incomprehensible amount of data all the time. However, the IoT devices have limited …
an incomprehensible amount of data all the time. However, the IoT devices have limited …
SWMQ: Secure wildcard pattern matching with query
L Xu, X Wei, G Cai, Y Li, H Wang - International Journal of …, 2022 - Wiley Online Library
Secure wildcard pattern matching (WPM) allows the pattern holder to obtain the matched
positions without revealing pattern and text information about both parties. However …
positions without revealing pattern and text information about both parties. However …
Secure approximate pattern matching protocol via Boolean threshold private set intersection
X Wei, L Xu, G Cai, H Wang - International Journal of Intelligent …, 2022 - Wiley Online Library
Approximate pattern matching (APM) measures whether the Hamming distance between
two strings is less than a threshold value. APM has been widely utilized, such as gene …
two strings is less than a threshold value. APM has been widely utilized, such as gene …
Efficient and secure pattern matching with wildcards using lightweight cryptography
Many secure protocols exist for the problem of determining occurrences of a pattern P as a
substring of a text string T. That is, when Alice has T, and Bob has P, the protocol computes …
substring of a text string T. That is, when Alice has T, and Bob has P, the protocol computes …
Secure wavelet matrix: Alphabet-friendly privacy-preserving string search for bioinformatics
H Sudo, M Jimbo, K Nuida… - IEEE/ACM transactions on …, 2018 - ieeexplore.ieee.org
Biomedical data often includes personal information, and the technology is demanded that
enables the searching of such sensitive data while protecting privacy. We consider a case in …
enables the searching of such sensitive data while protecting privacy. We consider a case in …