Iraklis Leontiadis, Ming Li
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achiev ...
ASSOC COMPUTING MACHINERY2018