Efficient and secure outsourced approximate pattern matching protocol

被引:11
|
作者
Wei, Xiaochao [1 ]
Zhao, Minghao [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Approximate pattern matching; Secure outsourced computing; Secret sharing scheme; Oblivious transfer extension; SEARCH;
D O I
10.1007/s00500-017-2560-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pattern matching is a basic algorithmic problem that identifies the appearance as well as the location of a pattern in a specific text, and one of the most important variants of that, approximate pattern matching, can be used to discern a substring in the text that is similar to the pattern, as long as their differences stay within a certain threshold. It serves as a basic component in many real-world applications, such as facial recognition, DNA matching and music retrieval. Motivated by the newly emerging secure outsourced computing, in this paper we proposed protocols to realize these functionalities in a privacy-preserving manner. Specifically, we constructed exact and approximate matching protocols, and both of them ensure that the party holds the text (with length of n) learns noting about the pattern (with length of m). We composed a novel idea to combine secret sharing scheme with oblivious transfer (OT), such as to transform the secure pattern matching problem into reconstructing of a shared secret, which means that if a shared secret can be correctly reconstructed, it indicates the pattern indeed exists in the text. Our protocol for approximate pattern matching is generated in the cloud-assisted setting, where the reconstruction phase is outsourced to an honest-but-curious cloud server. Using oblivious transfer extension technique, a powerful method to use few integrated OTs to implement large-scale single OTs, our protocol is efficiently constructed. Both of the protocols are secure in semi-honest model, and we present a detailed secure simulation-based proof in this paper.
引用
收藏
页码:1175 / 1187
页数:13
相关论文
共 50 条
  • [21] Assuring String Pattern Matching in Outsourced Middleboxes
    Yuan, Xingliang
    Duan, Huayi
    Wang, Cong
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (03) : 1362 - 1375
  • [22] Efficient and Secure Storage for Outsourced Data: A Survey
    Wang, Jianfeng
    Chen, Xiaofeng
    DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 178 - 188
  • [23] EARRING: Efficient Authentication of Outsourced Record Matching
    Dong, Boxiang
    Wang, Hui
    2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017), 2017, : 225 - 234
  • [24] Automated Design of Efficient Search Schemes for Lossless Approximate Pattern Matching
    Renders, Luca
    Depuydt, Lore
    Rahmann, Sven
    Fostier, Jan
    RESEARCH IN COMPUTATIONAL MOLECULAR BIOLOGY, RECOMB 2024, 2024, 14758 : 164 - 184
  • [25] Lossless Approximate Pattern Matching: Automated Design of Efficient Search Schemes
    Renders, Luca
    Depuydt, Lore
    Rahmann, Sven
    Fostier, Jan
    JOURNAL OF COMPUTATIONAL BIOLOGY, 2024,
  • [26] Approximate Pattern Matching Algorithm
    Hurtik, Petr
    Hodakova, Petra
    Perfilieva, Irina
    INFORMATION PROCESSING AND MANAGEMENT OF UNCERTAINTY IN KNOWLEDGE-BASED SYSTEMS, IPMU 2016, PT I, 2016, 610 : 577 - 587
  • [27] On approximate pattern matching with thresholds
    Zhang, Peng
    Atallah, Mikhail J.
    INFORMATION PROCESSING LETTERS, 2017, 123 : 21 - 26
  • [28] APPROXIMATE PATTERN-MATCHING
    MANBER, U
    WU, S
    BYTE, 1992, 17 (12): : 281 - +
  • [29] Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform
    Vergnaud, Damien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 41 - 58
  • [30] Bringing Execution Assurances of Pattern Matching in Outsourced Middleboxes
    Yuan, Xingliang
    Duan, Huayi
    Wang, Cong
    2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2016,