Protocol for Privacy-Preserving Set Pattern Matching

被引:1
|
作者
Zheng Qiang [1 ]
Luo Shou-shan [1 ]
Xin Yang [1 ]
Yang Yi-xian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
关键词
privacy-preserving; set pattern matching; secure multi-party computation; Shamir secret sharing; DISJOINTNESS;
D O I
10.1109/MINES.2009.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by the demand of databases outsourcing and its security concerns, privacy-preserving set operations have been a research hotspot in distributed scenario. By combining Shamir secret sharing scheme and homomorphic encryption, we propose a protocol for privacy-preserving set pattern matching, this protocol constructed in this paper is provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption. This is the first specific protocol for privacy-preserving set pattern matching in the cryptographic model at present.
引用
收藏
页码:168 / 172
页数:5
相关论文
共 50 条
  • [41] Privacy-Preserving Multi-set Operations
    Huang, Meishan
    Lin, Bogang
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 713 - 719
  • [42] A Privacy-preserving Multi-pattern Matching Scheme for Searching Strings in Cloud Database
    He, Meiqi
    Zhang, Jun
    Zeng, Gongxian
    Yiu, Siu Ming
    [J]. 2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 293 - 302
  • [43] Efficient Privacy-Preserving Face Identification Protocol
    Huang, Hai
    Wang, Luyao
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2632 - 2641
  • [44] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    [J]. ZTE Communications, 2011, 9 (02) : 36 - 38
  • [45] Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
    Kikuchi, Hiroaki
    Sato, Tomoki
    Sakuma, Jun
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 831 - 836
  • [46] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    [J]. FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [47] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [48] Strongly Privacy-Preserving Communication Protocol for VANETs
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Shih-Wei
    Juang, Wen-Shenq
    Huang, Jheng-Jia
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 119 - 126
  • [49] A protocol for privacy-preserving closest pair of points
    Liu, Jie
    Yang, Bo
    Pang, Xiaoqiong
    [J]. Journal of Computational Information Systems, 2013, 9 (17): : 6945 - 6953
  • [50] Privacy-Preserving Approximate Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Li, Dong
    Li, Lingjun
    Luo, Yonglong
    Dong, Fan
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 208 - 214