Outsourced Pattern Matching

被引:0
|
作者
Faust, Sebastian [1 ]
Hazay, Carmit [2 ]
Venturi, Daniele [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, Lausanne, Switzerland
[2] Bar Ilan Univ, Fac Engn, IL-52100 Ramat Gan, Israel
[3] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
SUBSET; COMPUTATION; ENCRYPTION; DELEGATION; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their computation and data to an untrusted server in the cloud. While most earlier work considers the general question of how to securely outsource any computation to the cloud server, we focus on concrete and important functionalities and give the first protocol for the pattern matching problem in the cloud. Loosely speaking, this problem considers a text T that is outsourced to the cloud S by a client C-T. In a query phase, clients C-1,...,C-l run an efficient protocol with the server S and the client C-T in order to learn the positions at which a pattern of length m matches the text (and nothing beyond that). This is called the outsourced pattern matching problem and is highly motivated in the context of delegatable computing since it offers storage alternatives for massive databases that contain confidential data (e. g., health related data about patient history). Our constructions offer simulation-based security in the presence of semi-honest and malicious adversaries (in the random oracle model) and limit the communication in the query phase to O(m) bits plus the number of occurrences - which is optimal. In contrast to generic solutions for delegatable computation, our schemes do not rely on fully homomorphic encryption but instead uses novel ideas for solving pattern matching, based on efficiently solvable instances of the subset sum problem.
引用
收藏
页码:545 / 556
页数:12
相关论文
共 50 条
  • [41] Palindrome pattern matching
    Tomohiro, I
    Inenaga, Shunsuke
    Takeda, Masayuki
    THEORETICAL COMPUTER SCIENCE, 2013, 483 : 162 - 170
  • [42] Focusing on Pattern Matching
    Krishnaswami, Neelakantan R.
    ACM SIGPLAN NOTICES, 2009, 44 (01) : 366 - 378
  • [43] Pattern matching in hypertext
    Amir, A
    Lewenstein, M
    Lewenstein, N
    ALGORITHMS AND DATA STRUCTURES, 1997, 1272 : 160 - 173
  • [44] Optimizing pattern matching
    Le Fessant, F
    Maranget, L
    ACM SIGPLAN NOTICES, 2001, 36 (10) : 26 - 37
  • [45] Refactoring pattern matching
    Wang, Meng
    Gibbons, Jeremy
    Matsuda, Kazutaka
    Hu, Zhenjiang
    SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (11) : 2216 - 2242
  • [46] Constrained Pattern Matching
    Choi, Yongwook
    Szpankowski, Wojciech
    ACM TRANSACTIONS ON ALGORITHMS, 2011, 7 (02)
  • [47] ANALYZING THE PERFORMANCE DIFFERENCES BETWEEN PATTERN MATCHING AND COMPRESSED PATTERN MATCHING ON TEXTS
    Erdogan, Cihat
    Bulus, H. Nusret
    Diri, Banu
    2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2013, : 135 - 138
  • [48] Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU
    celebi, Merve
    Yavanoglu, Uraz
    APPLIED SCIENCES-BASEL, 2023, 13 (14):
  • [49] A New Approach to Pattern Matching in Degenerate DNA/RNA Sequences and Distributed Pattern Matching
    Iliopoulos, Costas S.
    Mouchard, Laurent
    Rahman, M. Sohel
    MATHEMATICS IN COMPUTER SCIENCE, 2008, 1 (04) : 557 - 569
  • [50] VLSI ARCHITECTURES FOR STRING MATCHING AND PATTERN-MATCHING
    CHENG, HD
    FU, KS
    PATTERN RECOGNITION, 1987, 20 (01) : 125 - 141