Open AccessDOI
A Conjunction, Language, and System Facets for Private Packet Filtering
TLDR
This contribution defines a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet filtering.Abstract:
Our contribution defines a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet filtering. Private stream searching uses an encrypted filter to conceal search terms, processes a search without decrypting the filter, and saves encrypted results to an output buffer. Our conjunction operator is processed as a bitwise summation of hashed keyword values and as a reference into the filter. The operator thus broadens the search capability, and does not increase the complexity of the private search system. When integrated into the language, cyber defenders can filter packets using sensitive attack indicators, and gain situational awareness without revealing those sensitive indicators.read more
Citations
More filters
Space-efficient private search with applications to rateless codes
George Danezis,Claudia Diaz +1 more
TL;DR: In this paper, the authors improved the space efficiency of the Ostrovsky et al. private keyword search by describing methods that require considerably shorter buffers for returning the results of the search.
References
More filters
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Book ChapterDOI
Evaluating 2-DNF formulas on ciphertexts
TL;DR: A homomorphic public key encryption scheme that allows the public evaluation of ψ given an encryption of the variables x1,...,xn and can evaluate quadratic multi-variate polynomials on ciphertexts provided the resulting value falls within a small set.
The S/KEY One-Time Password System
TL;DR: This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3].
Journal ArticleDOI
Data Security
TL;DR: The general nature of controls of each type are described, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses are described.
Journal ArticleDOI
Private Searching on Streaming Data
TL;DR: In this article, the authors consider the problem of private searching on streaming data, where they can efficiently implement searching for documents that satisfy a secret criteria (such as the presence or absence of a hidden combination of hidden keywords) under various cryptographic assumptions.
Related Papers (5)
Resource packet encryption method, resource packet decryption method and devices
Xu Renjie,Gao Kaiming,Li Ying +2 more