Efficient and secure outsourced approximate pattern matching protocol

被引:11
|
作者
Wei, Xiaochao [1 ]
Zhao, Minghao [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Approximate pattern matching; Secure outsourced computing; Secret sharing scheme; Oblivious transfer extension; SEARCH;
D O I
10.1007/s00500-017-2560-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pattern matching is a basic algorithmic problem that identifies the appearance as well as the location of a pattern in a specific text, and one of the most important variants of that, approximate pattern matching, can be used to discern a substring in the text that is similar to the pattern, as long as their differences stay within a certain threshold. It serves as a basic component in many real-world applications, such as facial recognition, DNA matching and music retrieval. Motivated by the newly emerging secure outsourced computing, in this paper we proposed protocols to realize these functionalities in a privacy-preserving manner. Specifically, we constructed exact and approximate matching protocols, and both of them ensure that the party holds the text (with length of n) learns noting about the pattern (with length of m). We composed a novel idea to combine secret sharing scheme with oblivious transfer (OT), such as to transform the secure pattern matching problem into reconstructing of a shared secret, which means that if a shared secret can be correctly reconstructed, it indicates the pattern indeed exists in the text. Our protocol for approximate pattern matching is generated in the cloud-assisted setting, where the reconstruction phase is outsourced to an honest-but-curious cloud server. Using oblivious transfer extension technique, a powerful method to use few integrated OTs to implement large-scale single OTs, our protocol is efficiently constructed. Both of the protocols are secure in semi-honest model, and we present a detailed secure simulation-based proof in this paper.
引用
下载
收藏
页码:1175 / 1187
页数:13
相关论文
共 50 条
  • [1] Efficient and secure outsourced approximate pattern matching protocol
    Xiaochao Wei
    Minghao Zhao
    Qiuliang Xu
    Soft Computing, 2018, 22 : 1175 - 1187
  • [2] An Efficient Secure Two-Party Approximate Pattern Matching Protocol
    Xu L.
    Wei X.
    Cai G.
    Wang H.
    Zheng Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1819 - 1830
  • [3] Efficient authentication of approximate record matching for outsourced databases
    Dong B.
    Wang H.W.
    Advances in Intelligent Systems and Computing, 2019, 838 : 119 - 168
  • [4] Secure and privacy-preserving pattern matching in outsourced computing
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3444 - 3451
  • [5] Secure approximate pattern matching protocol via Boolean threshold private set intersection
    Wei, Xiaochao
    Xu, Lin
    Cai, Guopeng
    Wang, Hao
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 9245 - 9266
  • [6] Outsourced pattern matching
    Faust, Sebastian
    Hazay, Carmit
    Venturi, Daniele
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (03) : 327 - 346
  • [7] Outsourced pattern matching
    Sebastian Faust
    Carmit Hazay
    Daniele Venturi
    International Journal of Information Security, 2018, 17 : 327 - 346
  • [8] Outsourced Pattern Matching
    Faust, Sebastian
    Hazay, Carmit
    Venturi, Daniele
    AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2013, 7966 : 545 - 556
  • [9] Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment
    Wei X.
    Xu L.
    Zheng Z.
    Wang H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2365 - 2374
  • [10] PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 135 - 153