An Efficient Protocol for Oblivious DFA Evaluation and Applications

被引:0
|
作者
Mohassel, Payman [1 ]
Niksefat, Salman [2 ]
Sadeghian, Saeed [1 ,3 ]
Sadeghiyan, Babak [2 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
[2] Amirkabir Univ Technol, Tehran, Iran
[3] Univ Calgary, Calgary, AB T2N 1N4, Canada
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we design an efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server). The protocol runs in a single round, and only requires a small amount of computation by each party. The most efficient version of our protocol only requires O(kappa) asymmetric operations by either party, where kappa is the security parameter. Moreover, the client's total computation is only linear in his own input and independent of the size of the DFA. We prove the protocol fully-secure against a malicious client and private against a malicious server, using the standard simulation-based security definitions for secure two-party computation. We show how to transform our construction in order to solve multiple variants of the secure pattern matching problem without any computational overhead. The more challenging variant is when parties want to compute the number of occurrences of a pattern in a text (but nothing else). We observe that, for this variant, we need a protocol for counting the number of accepting states visited during the evaluation of a DFA on an input. We then introduce a novel modification to our original protocol in order to solve the counting variant, without any loss in efficiency or security. Finally, we fully implement our protocol and run a series of experiments on a client/server network environment. Our experimental results demonstrate the efficiency of our proposed protocol and, confirm the particularly low computation overhead of the client.
引用
收藏
页码:398 / +
页数:2
相关论文
共 50 条
  • [1] Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
    Phalakarn, Kittiphop
    Attrapadung, Nuttapong
    Matsuura, Kanta
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 605 - 625
  • [2] Two-Party Oblivious DFA Evaluation Protocol
    Khachatryan, Gurgen
    Hovsepyan, Mihran
    Jivanyan, Aram
    MEETING SECURITY CHALLENGES THROUGH DATA ANALYTICS AND DECISION SUPPORT, 2016, 47 : 276 - 286
  • [3] Oblivious DFA evaluation on joint input and its applications
    Zhao, Chuan
    Zhao, Shengnan
    Zhang, Bo
    Jing, Shan
    Chen, Zhenxiang
    Zhao, Minghao
    INFORMATION SCIENCES, 2020, 528 (528) : 168 - 180
  • [4] Augmented oblivious polynomial evaluation protocol and its applications
    Zhu, HF
    Bao, F
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 222 - 230
  • [5] An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications
    Zhao, Shengnan
    Song, Xiangfu
    Jiang, Han
    Ma, Ming
    Zheng, Zhihua
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [6] An efficient and unconditionally-secure oblivious polynomial evaluation protocol
    Yang Bo
    Wang Qinglong
    Cao Yunfei
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 181 - +
  • [7] An efficient quantum oblivious transfer protocol
    Sarkar, Sushmita
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    Mesnager, Sihem
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14037 - 14048
  • [8] Multivariate oblivious polynomial evaluation protocol
    Xiao Mingjun
    Huang Liusheng
    Liu An
    Han Kai
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (02): : 217 - 222
  • [9] An efficient oblivious transfer protocol with access control
    Liao, Yaqing
    Zhou, Jing
    Yang, Yang
    Ruan, Ou
    2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 29 - 34
  • [10] Unconditionally secure Oblivious Polynomial Evaluation protocol
    Li Luyao
    Duan Zongtao
    Wang Qinglong
    Wang Jing
    Dai Ming
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED ICT AND EDUCATION, 2013, 33 : 579 - 583