Oblivious DFA evaluation on joint input and its applications

被引:2
|
作者
Zhao, Chuan [1 ,2 ,3 ]
Zhao, Shengnan [4 ]
Zhang, Bo [1 ,2 ]
Jing, Shan [1 ,2 ]
Chen, Zhenxiang [1 ,2 ]
Zhao, Minghao [5 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure computation; Oblivious DFA evaluation; Outsourcing; Oblivious transfer; Semi-honest model; EFFICIENT; AUTOMATA; PROTOCOLS;
D O I
10.1016/j.ins.2020.03.065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious deterministic finite automata (DFA) evaluation is a powerful two-party primitive that has been widely used in cryptographic protocols. It enables two mutually distrusted participants to obliviously evaluate a DFA (provided by one party) on an input string (provided by the other party), while preserving the privacy of each party from the other one. However, this primitive is not flexible and powerful enough, in the sense that it only supports evaluation on input string that is provided by one participant. In this paper, we propose oblivious DFA evaluation on joint input (denoted as F-ODFAJI), a variant that extends the functionality of traditional oblivious DFA evaluation protocols. The new primitive enables two participants to collaboratively evaluate a DFA on a joint input, where the input is a combination of two input strings provided by both of the participants. To enable modularized instantiation, we first propose and instantiate F-OTJC - oblivious transfer with joint choice - a functionality as modified oblivious transfer (OT), and then provide an efficient instantiation for F-ODFAJI in F-OTJC-hybrid model. Security proof demonstrates that the proposed protocol is secure under semi-honest model, and theoretical performance analysis shows that it achieves satisfactory efficiency and scalability. F-ODFAJI is a basic as well as an important building block for high-level secure outsourced computing tasks. In this paper, we use secure outsourced pattern matching as a case study and show how it can be applied to construct such high-level protocols. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:168 / 180
页数:13
相关论文
共 50 条
  • [11] An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications
    Zhao, Shengnan
    Song, Xiangfu
    Jiang, Han
    Ma, Ming
    Zheng, Zhihua
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [12] Oblivious polynomial evaluation and oblivious neural learning
    Chang, YC
    Lu, CJ
    THEORETICAL COMPUTER SCIENCE, 2005, 341 (1-3) : 39 - 54
  • [13] Practical t-out-n oblivious transfer and its applications
    Wu, QH
    Zhang, JH
    Wang, YM
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 226 - 237
  • [14] Cache-Oblivious and Data-Oblivious Sorting and Applications
    Chan, T-H. Hubert
    Guo, Yue
    Lin, Wei-Kai
    Shi, Elaine
    SODA'18: PROCEEDINGS OF THE TWENTY-NINTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2018, : 2201 - 2220
  • [15] Oblivious polynomial evaluation
    Hong-Da Li
    Dong-Yao Ji
    Deng-Guo Feng
    Bao Li
    Journal of Computer Science and Technology, 2004, 19 : 550 - 554
  • [16] Oblivious polynomial evaluation
    Li, HD
    Ji, DY
    Feng, DG
    Li, B
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 550 - 554
  • [17] Oblivious polynomial evaluation
    Naor, M
    Pinkas, B
    SIAM JOURNAL ON COMPUTING, 2006, 35 (05) : 1254 - 1281
  • [18] Weak minimization of DFA - an algorithm and applications
    Ravikumar, B
    Eisman, G
    THEORETICAL COMPUTER SCIENCE, 2004, 328 (1-2) : 113 - 133
  • [19] Oblivious Parallel RAM and Applications
    Boyle, Elette
    Chung, Kai-Min
    Pass, Rafael
    THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 : 175 - 204
  • [20] Weak minimization of DFA - An algorithm and applications
    Ravikumar, B
    IMPLEMENTATION AND APPLICATION OF AUTOMATA, PROCEEDINGS, 2003, 2759 : 226 - 238