scispace - formally typeset
Open AccessDOI

A Conjunction, Language, and System Facets for Private Packet Filtering

TLDR
This contribution defines a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet filtering.
Abstract
Our contribution defines a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet filtering. Private stream searching uses an encrypted filter to conceal search terms, processes a search without decrypting the filter, and saves encrypted results to an output buffer. Our conjunction operator is processed as a bitwise summation of hashed keyword values and as a reference into the filter. The operator thus broadens the search capability, and does not increase the complexity of the private search system. When integrated into the language, cyber defenders can filter packets using sensitive attack indicators, and gain situational awareness without revealing those sensitive indicators.

read more

Citations
More filters

Space-efficient private search with applications to rateless codes

TL;DR: In this paper, the authors improved the space efficiency of the Ostrovsky et al. private keyword search by describing methods that require considerably shorter buffers for returning the results of the search.
References
More filters
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Book ChapterDOI

Evaluating 2-DNF formulas on ciphertexts

TL;DR: A homomorphic public key encryption scheme that allows the public evaluation of ψ given an encryption of the variables x1,...,xn and can evaluate quadratic multi-variate polynomials on ciphertexts provided the resulting value falls within a small set.

The S/KEY One-Time Password System

N. Haller
TL;DR: This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3].
Journal ArticleDOI

Data Security

TL;DR: The general nature of controls of each type are described, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses are described.
Journal ArticleDOI

Private Searching on Streaming Data

TL;DR: In this article, the authors consider the problem of private searching on streaming data, where they can efficiently implement searching for documents that satisfy a secret criteria (such as the presence or absence of a hidden combination of hidden keywords) under various cryptographic assumptions.