Oblivious DFA evaluation on joint input and its applications

被引:2
|
作者
Zhao, Chuan [1 ,2 ,3 ]
Zhao, Shengnan [4 ]
Zhang, Bo [1 ,2 ]
Jing, Shan [1 ,2 ]
Chen, Zhenxiang [1 ,2 ]
Zhao, Minghao [5 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure computation; Oblivious DFA evaluation; Outsourcing; Oblivious transfer; Semi-honest model; EFFICIENT; AUTOMATA; PROTOCOLS;
D O I
10.1016/j.ins.2020.03.065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious deterministic finite automata (DFA) evaluation is a powerful two-party primitive that has been widely used in cryptographic protocols. It enables two mutually distrusted participants to obliviously evaluate a DFA (provided by one party) on an input string (provided by the other party), while preserving the privacy of each party from the other one. However, this primitive is not flexible and powerful enough, in the sense that it only supports evaluation on input string that is provided by one participant. In this paper, we propose oblivious DFA evaluation on joint input (denoted as F-ODFAJI), a variant that extends the functionality of traditional oblivious DFA evaluation protocols. The new primitive enables two participants to collaboratively evaluate a DFA on a joint input, where the input is a combination of two input strings provided by both of the participants. To enable modularized instantiation, we first propose and instantiate F-OTJC - oblivious transfer with joint choice - a functionality as modified oblivious transfer (OT), and then provide an efficient instantiation for F-ODFAJI in F-OTJC-hybrid model. Security proof demonstrates that the proposed protocol is secure under semi-honest model, and theoretical performance analysis shows that it achieves satisfactory efficiency and scalability. F-ODFAJI is a basic as well as an important building block for high-level secure outsourced computing tasks. In this paper, we use secure outsourced pattern matching as a case study and show how it can be applied to construct such high-level protocols. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:168 / 180
页数:13
相关论文
共 50 条
  • [31] Hybrid ITS for DFA Construction Problems
    Darshan, K. M.
    Kumar, Viraj
    24TH INTERNATIONAL CONFERENCE ON COMPUTERS IN EDUCATION (ICCE 2016): THINK GLOBAL ACT LOCAL, 2016, : 96 - 98
  • [34] Oblivious Polynomial Evaluation in the Exponent, Revisited
    Itakura, Naota
    Kurosawa, Kaoru
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 26 - 33
  • [35] A Characterization of the Left Joint Spectrum and Its Applications
    史平
    马吉溥
    Northeastern Mathematical Journal, 2004, (02) : 191 - 199
  • [36] Oblivious RAM: A Dissection and Experimental Evaluation
    Chang, Zhao
    Xie, Dong
    Li, Feifei
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2016, 9 (12): : 1113 - 1124
  • [37] A Fast and Simple Partially Oblivious PRF, with Applications
    Tyagi, Nirvan
    Celi, Sofia
    Ristenpart, Thomas
    Sullivan, Nick
    Tessaro, Stefano
    Wood, Christopher A.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 674 - 705
  • [38] Multivariate oblivious polynomial evaluation protocol
    Xiao Mingjun
    Huang Liusheng
    Liu An
    Han Kai
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (02): : 217 - 222
  • [39] Verifiable and Private Oblivious Polynomial Evaluation
    Gajera, Hardik
    Giraud, Matthieu
    Gerault, David
    Das, Manik Lal
    Lafourcade, Pascal
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2019, 2020, 12024 : 49 - 65
  • [40] EVALUATION OF DFA/M IN MODULAR PRODUCT DEVELOPMENT
    Wang, Chung-Shing
    Wang, Wei-Hua Andrew
    Lin, Man-Ching
    PROCEEDINGS OF THE 38TH INTERNATIONAL CONFERENCE ON COMPUTERS AND INDUSTRIAL ENGINEERING, VOLS 1-3, 2008, : 2081 - 2090