Protocol for Privacy-Preserving Set Pattern Matching

被引:1
|
作者
Zheng Qiang [1 ]
Luo Shou-shan [1 ]
Xin Yang [1 ]
Yang Yi-xian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
关键词
privacy-preserving; set pattern matching; secure multi-party computation; Shamir secret sharing; DISJOINTNESS;
D O I
10.1109/MINES.2009.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by the demand of databases outsourcing and its security concerns, privacy-preserving set operations have been a research hotspot in distributed scenario. By combining Shamir secret sharing scheme and homomorphic encryption, we propose a protocol for privacy-preserving set pattern matching, this protocol constructed in this paper is provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption. This is the first specific protocol for privacy-preserving set pattern matching in the cryptographic model at present.
引用
收藏
页码:168 / 172
页数:5
相关论文
共 50 条
  • [1] Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications
    Qin, Hong
    Wang, Hao
    Wei, Xiaochao
    Xue, Likun
    Wu, Lei
    [J]. IEEE ACCESS, 2019, 7 : 36094 - 36102
  • [2] An Enhancement of Privacy-Preserving Wildcards Pattern Matching
    Saha, Tushar Kanti
    Koshiba, Takeshi
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 145 - 160
  • [3] Privacy-Preserving Subgraph Matching Protocol for Two Parties
    Xu, Zifeng
    Zhou, Fucai
    Li, Yuxi
    Xu, Jian
    Wang, Qiang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 571 - 588
  • [4] Privacy-Preserving Profile Matching Protocol Considering Conditions
    Ishikuro, Yosuke
    Omote, Kazumasa
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 171 - 183
  • [5] Secure and privacy-preserving pattern matching in outsourced computing
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3444 - 3451
  • [6] A Privacy-Preserving Framework for Subgraph Pattern Matching in Cloud
    Gao, Jiuru
    Xu, Jiajie
    Liu, Guanfeng
    Chen, Wei
    Yin, Hongzhi
    Zhao, Lei
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2018, PT I, 2018, 10827 : 307 - 322
  • [7] A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification
    Wong, Kok-Seng
    Kim, Myung-Ho
    [J]. 2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 120 - 125
  • [8] Privacy-preserving Spatiotemporal Matching
    Sun, Jingchao
    Zhang, Rui
    Zhang, Yanchao
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 800 - 808
  • [9] Privacy-Preserving Statistics Protocol for Set-Based Computation
    Song, Xiangfu
    Gai, Min
    Zhao, Shengnan
    Jiang, Han
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2221 - 2231
  • [10] Privacy-preserving set union
    Frikken, Keith
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 237 - 252