Oblivious DFA evaluation on joint input and its applications

被引:2
|
作者
Zhao, Chuan [1 ,2 ,3 ]
Zhao, Shengnan [4 ]
Zhang, Bo [1 ,2 ]
Jing, Shan [1 ,2 ]
Chen, Zhenxiang [1 ,2 ]
Zhao, Minghao [5 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure computation; Oblivious DFA evaluation; Outsourcing; Oblivious transfer; Semi-honest model; EFFICIENT; AUTOMATA; PROTOCOLS;
D O I
10.1016/j.ins.2020.03.065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious deterministic finite automata (DFA) evaluation is a powerful two-party primitive that has been widely used in cryptographic protocols. It enables two mutually distrusted participants to obliviously evaluate a DFA (provided by one party) on an input string (provided by the other party), while preserving the privacy of each party from the other one. However, this primitive is not flexible and powerful enough, in the sense that it only supports evaluation on input string that is provided by one participant. In this paper, we propose oblivious DFA evaluation on joint input (denoted as F-ODFAJI), a variant that extends the functionality of traditional oblivious DFA evaluation protocols. The new primitive enables two participants to collaboratively evaluate a DFA on a joint input, where the input is a combination of two input strings provided by both of the participants. To enable modularized instantiation, we first propose and instantiate F-OTJC - oblivious transfer with joint choice - a functionality as modified oblivious transfer (OT), and then provide an efficient instantiation for F-ODFAJI in F-OTJC-hybrid model. Security proof demonstrates that the proposed protocol is secure under semi-honest model, and theoretical performance analysis shows that it achieves satisfactory efficiency and scalability. F-ODFAJI is a basic as well as an important building block for high-level secure outsourced computing tasks. In this paper, we use secure outsourced pattern matching as a case study and show how it can be applied to construct such high-level protocols. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:168 / 180
页数:13
相关论文
共 50 条
  • [21] TuringMobile: a turing machine of oblivious mobile robots with limited visibility and its applications
    Giuseppe A. Di Luna
    Paola Flocchini
    Nicola Santoro
    Giovanni Viglietta
    Distributed Computing, 2022, 35 : 105 - 122
  • [22] TuringMobile: a turing machine of oblivious mobile robots with limited visibility and its applications
    Di Luna, Giuseppe A.
    Flocchini, Paola
    Santoro, Nicola
    Viglietta, Giovanni
    DISTRIBUTED COMPUTING, 2022, 35 (02) : 105 - 122
  • [23] TuringMobile: a turing machine of oblivious mobile robots with limited visibility and its applications
    Luna, Giuseppe A. Di
    Flocchini, Paola
    Santoro, Nicola
    Viglietta, Giovanni
    Distributed Computing, 2022, 35 (02): : 105 - 122
  • [24] RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching
    Tang, Qiu
    Jiang, Lei
    Dai, Qiong
    Su, Majing
    Xie, Hongtao
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 255 - 268
  • [25] JOINT VENTURERS OBLIVIOUS TO TAX CALAMITY - LAWYER
    BURDA, D
    HOSPITALS, 1987, 61 (15): : 52 - 52
  • [26] Oblivious evaluation of multivariate polynomials
    Tassa, Tamir
    Jarrous, Ayman
    Ben-Ya'akov, Yonatan
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (01) : 1 - 29
  • [27] Oblivious decision program evaluation
    Niksefat, Salman
    Sadeghiyan, Babak
    Mohassel, Payman
    IET INFORMATION SECURITY, 2013, 7 (02) : 155 - 163
  • [28] Oblivious Linear Group Actions and Applications
    Attrapadung, Nuttapong
    Hanaoaka, Goichiro
    Matsuda, Takahiro
    Morita, Hiraku
    Ohara, Kazuma
    Schuldt, Jacob C. N.
    Teruya, Tadanori
    Tozawa, Kazunari
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 630 - 650
  • [29] Identity-Based Verifiable Aggregator Oblivious Encryption and Its Applications in Smart Grids
    Wang, Zhiwei
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2021, 6 (01): : 80 - 89
  • [30] CONCEPT OF DFA PRODUCT ANALYSIS AND EVALUATION
    Senderska, Katarina
    Mares, Albert
    FACTA UNIVERSITATIS-SERIES MECHANICAL ENGINEERING, 2011, 9 (01) : 101 - 106