Secure Full-Text Search Using Function Secret Sharing
Abstract
References
Index Terms
- Secure Full-Text Search Using Function Secret Sharing
Recommendations
TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecuritySecure computation methods include methods that use homomorphic encryption (HE) and those that use secret sharing (SS). Secure computation based on HE can be realized using one server, and the computation process can be made public if the encryption key ...
Verifiable Threshold Secret Sharing and Full Fair Secure Two-Party Computation
AST '09: Proceedings of the 2009 International e-Conference on Advanced Science and TechnologyBased on the verifiable encryption and zero-knowledge proof protocols of Jarecki and Shmatikov and Pedersen’s verifiable threshold secret sharing scheme, this paper proposes a new full fair secure two-party computation protocols. For getting full fair, ...
Complete fairness in secure two-party computation
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingIn the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 109Total Downloads
- Downloads (Last 12 months)109
- Downloads (Last 6 weeks)37
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in