Oblivious DFA evaluation on joint input and its applications

被引:2
|
作者
Zhao, Chuan [1 ,2 ,3 ]
Zhao, Shengnan [4 ]
Zhang, Bo [1 ,2 ]
Jing, Shan [1 ,2 ]
Chen, Zhenxiang [1 ,2 ]
Zhao, Minghao [5 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure computation; Oblivious DFA evaluation; Outsourcing; Oblivious transfer; Semi-honest model; EFFICIENT; AUTOMATA; PROTOCOLS;
D O I
10.1016/j.ins.2020.03.065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious deterministic finite automata (DFA) evaluation is a powerful two-party primitive that has been widely used in cryptographic protocols. It enables two mutually distrusted participants to obliviously evaluate a DFA (provided by one party) on an input string (provided by the other party), while preserving the privacy of each party from the other one. However, this primitive is not flexible and powerful enough, in the sense that it only supports evaluation on input string that is provided by one participant. In this paper, we propose oblivious DFA evaluation on joint input (denoted as F-ODFAJI), a variant that extends the functionality of traditional oblivious DFA evaluation protocols. The new primitive enables two participants to collaboratively evaluate a DFA on a joint input, where the input is a combination of two input strings provided by both of the participants. To enable modularized instantiation, we first propose and instantiate F-OTJC - oblivious transfer with joint choice - a functionality as modified oblivious transfer (OT), and then provide an efficient instantiation for F-ODFAJI in F-OTJC-hybrid model. Security proof demonstrates that the proposed protocol is secure under semi-honest model, and theoretical performance analysis shows that it achieves satisfactory efficiency and scalability. F-ODFAJI is a basic as well as an important building block for high-level secure outsourced computing tasks. In this paper, we use secure outsourced pattern matching as a case study and show how it can be applied to construct such high-level protocols. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:168 / 180
页数:13
相关论文
共 50 条
  • [1] An Efficient Protocol for Oblivious DFA Evaluation and Applications
    Mohassel, Payman
    Niksefat, Salman
    Sadeghian, Saeed
    Sadeghiyan, Babak
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 398 - +
  • [2] Two-Party Oblivious DFA Evaluation Protocol
    Khachatryan, Gurgen
    Hovsepyan, Mihran
    Jivanyan, Aram
    MEETING SECURITY CHALLENGES THROUGH DATA ANALYTICS AND DECISION SUPPORT, 2016, 47 : 276 - 286
  • [3] Distributed oblivious function evaluation and its applications
    Li, HD
    Yang, X
    Feng, DG
    Li, B
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 942 - 947
  • [4] Distributed oblivious function evaluation and its applications
    Hong-Da Li
    Xiong Yang
    Deng-Guo Feng
    Bao Li
    Journal of Computer Science and Technology, 2004, 19 : 942 - 947
  • [5] Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
    Phalakarn, Kittiphop
    Attrapadung, Nuttapong
    Matsuura, Kanta
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 605 - 625
  • [6] Augmented oblivious polynomial evaluation protocol and its applications
    Zhu, HF
    Bao, F
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 222 - 230
  • [7] Laconic Oblivious Transfer and Its Applications
    Cho, Chongwon
    Dottling, Nico
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Polychroniadou, Antigoni
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 33 - 65
  • [8] Efficient Traceable Oblivious Transfer and Its Applications
    Liu, Weiwei
    Zhang, Yinghui
    Mu, Yi
    Yang, Guomin
    Tian, Yangguang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 610 - 621
  • [9] Subset Membership Encryption and Its Applications to Oblivious Transfer
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1098 - 1107
  • [10] Oblivious Infinite Derivable Function Evaluation and Its Application
    Pang Shuting
    Tang Chunming
    Hao Zhifeng
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 92 - 95