Oblivious DFA evaluation on joint input and its applications

被引:2
|
作者
Zhao, Chuan [1 ,2 ,3 ]
Zhao, Shengnan [4 ]
Zhang, Bo [1 ,2 ]
Jing, Shan [1 ,2 ]
Chen, Zhenxiang [1 ,2 ]
Zhao, Minghao [5 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[3] Shandong Prov Key Lab Software Engn, Jinan, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Tsinghua Univ, Sch Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure computation; Oblivious DFA evaluation; Outsourcing; Oblivious transfer; Semi-honest model; EFFICIENT; AUTOMATA; PROTOCOLS;
D O I
10.1016/j.ins.2020.03.065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious deterministic finite automata (DFA) evaluation is a powerful two-party primitive that has been widely used in cryptographic protocols. It enables two mutually distrusted participants to obliviously evaluate a DFA (provided by one party) on an input string (provided by the other party), while preserving the privacy of each party from the other one. However, this primitive is not flexible and powerful enough, in the sense that it only supports evaluation on input string that is provided by one participant. In this paper, we propose oblivious DFA evaluation on joint input (denoted as F-ODFAJI), a variant that extends the functionality of traditional oblivious DFA evaluation protocols. The new primitive enables two participants to collaboratively evaluate a DFA on a joint input, where the input is a combination of two input strings provided by both of the participants. To enable modularized instantiation, we first propose and instantiate F-OTJC - oblivious transfer with joint choice - a functionality as modified oblivious transfer (OT), and then provide an efficient instantiation for F-ODFAJI in F-OTJC-hybrid model. Security proof demonstrates that the proposed protocol is secure under semi-honest model, and theoretical performance analysis shows that it achieves satisfactory efficiency and scalability. F-ODFAJI is a basic as well as an important building block for high-level secure outsourced computing tasks. In this paper, we use secure outsourced pattern matching as a case study and show how it can be applied to construct such high-level protocols. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:168 / 180
页数:13
相关论文
共 50 条
  • [41] Learning DFA representations of HTTP for protecting web applications
    Ingham, Kenneth L.
    Somayaji, Anil
    Burge, John
    Forrest, Stephanie
    COMPUTER NETWORKS, 2007, 51 (05) : 1239 - 1255
  • [42] LYMPHANGIOGRAPHY - EVALUATION OF ITS APPLICATIONS
    SEITZMAN, DM
    HALABY, FA
    JOURNAL OF UROLOGY, 1964, 91 (03): : 301 - &
  • [43] INTEGRAL - ITS EVALUATION AND APPLICATIONS
    GIRI, N
    SANKHYA-THE INDIAN JOURNAL OF STATISTICS SERIES A, 1973, 35 (SEP): : 334 - 340
  • [44] A SEMIAUTOMATIC COMPUTER INPUT OF PICTURE DATA AND SOME OF ITS APPLICATIONS
    GALIK, J
    KREKULE, I
    PHYSIOLOGIA BOHEMOSLOVACA, 1984, 33 (06): : 527 - 528
  • [45] Input-Output Model in Qingchuan County and Its Applications
    LIU Guangzhong
    HE Changzheng
    XU Jinping (Dept. of Applied Mathematics Chengdu University of Science and Techonology
    Journal of Systems Science and Systems Engineering, 1995, (04) : 21 - 34
  • [46] Stochastic Decomposition Results for Poisson Input Queue and Its Applications
    Choudhury, Gautam
    Goswami, Akhil
    Begum, Anjana
    Sarmah, Hemanta Kumar
    THAILAND STATISTICIAN, 2022, 20 (01): : 185 - 194
  • [47] Input-Output Model in Qingchuan County and Its Applications
    LIU GUangzhong
    HE Changzheng
    XU Jiuping(Dept.of Applied Mathematics
    Journal of Systems Science and Systems Engineering, 1995, (S1) : 21 - 34
  • [48] A Conceptual Framework for User Input Evaluation in Rich Internet Applications
    Book, Matthias
    Brueckmann, Tobias
    Gruhn, Volker
    Huelder, Malte
    WEB ENGINEERING, PROCEEDINGS, 2009, 5648 : 275 - 282
  • [49] A Comprehensive Evaluation of the Effects of Input Data on the Resilience of GPU Applications
    Previlon, Fritz G.
    Kalra, Charu
    Kaeli, David R.
    Rech, Paolo
    2019 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT), 2019,
  • [50] Applications of Wireline Formation Testing (WFT) and Downhole Fluid Analysis (DFA): Reviewing the Importance of This Technology in Reservoir Evaluation
    Alshmlh, N. A. H.
    Abbas, M. V.
    Shahid, A. S. A.
    JOURNAL OF THE PAKISTAN INSTITUTE OF CHEMICAL ENGINEERS, 2021, 49 (02): : 59 - 73