Главная
Study mode:
on
1
Introduction
2
Applications
3
Papers
4
Previous Talk
5
Overview
6
Simpler Protocol
7
Simpler Example
8
Militia Example
9
What is an Automata
10
Security Requirements
11
Motivations
12
KNP Techniques
13
Automata
14
Automata Encryption
15
Select
16
Evaluation
17
Conclusion
Description:
Explore a talk from PKC 2010 on Text Search Protocols with Simulation Based Security, presented by authors Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen. Delve into the intricacies of automata encryption, select and evaluation techniques, and the KNP approach. Discover applications, previous research, and a simplified protocol explanation using real-world examples like militia scenarios. Gain insights into security requirements, motivations behind the research, and the fundamental concepts of automata in cryptography. Conclude with a comprehensive understanding of text search protocols and their implications for secure information retrieval.

Text Search Protocols with Simulation Based Security

TheIACR
Add to list