scispace - formally typeset
Journal ArticleDOI

Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

Carmit Hazay, +1 more
- 01 Apr 2014 - 
- Vol. 27, Iss: 2, pp 358-395
Reads0
Chats0
TLDR
The construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O(n+m) group elements in a constant round complexity.
Abstract
We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t?{0,1}? of length n, while Bob has a pattern p?{0,1}? of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice's text, while Alice learns nothing. Private pattern matching is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O(n+m) group elements in a constant round complexity. This improves over previous work by Gennaro et al. (Public Key Cryptography, pp. 145---160, 2010) whose solution requires overhead of O(nm) group elements and exponentiations in O(m) rounds. In addition to the above, we propose a collection of protocols for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O(n+m) communication and O(1) rounds using O(nm) computation. Then we treat secure approximate pattern matching. In this variant the matches may be approximated, i.e., have Hamming distance less than some threshold, ?. Our protocol requires O(n?) communication in O(1) rounds using O(nm) computation. Third, we have secure pattern matching with hidden pattern length. Here, the length, m, of Bob's pattern remains a secret. Our protocol requires O(n+M) communication in O(1) rounds using O(n+M) computation, where M is an upper bound on m. Finally, we have secure pattern matching with hidden text length. Finally, in this variant the length, n, of Alice's text remains a secret. Our protocol requires O(N+m) communication in O(1) rounds using O(N+m) computation, where N is an upper bound on n.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes (Full Version)

TL;DR: This paper begins to address genomic privacy by focusing on three important applications: Paternity Tests, Personalized Medicine, and Genetic Compatibility Tests, and proposes a set of efficient techniques based on private set operations that allow in in silico some operations that are currently performed via in vitro methods, in a secure fashion.
Proceedings ArticleDOI

Secure pattern matching using somewhat homomorphic encryption

TL;DR: This paper makes use of the somewhat homomorphic encryption scheme presented by Lauter, Naehrig and Vaikuntanathan (ACM CCSW 2011), which supports a limited number of both additions and multiplications on encrypted data and proposes a new packing method suitable for an efficient computation of multiple Hamming distance values onencrypted data.
Journal ArticleDOI

The Chills and Thrills of Whole Genome Sequencing

TL;DR: In this article, the authors discuss some important privacy issues associated with human genomic information and identify a number of particularly relevant research challenges, and summarize recent advances in genomics, after summarizing recent advances.
Book ChapterDOI

An efficient protocol for oblivious DFA evaluation and applications

TL;DR: An efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server) and the most efficient version of this protocol only requires O(k) asymmetric operations by either party, where k is the security parameter.
Book ChapterDOI

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs

TL;DR: This paper uses the [6] technique for verifiable delegation of polynomial evaluations, using algebraic PRFs to achieve verifiability in the outsourced setting, and introduces a new technique for designing efficient secure protocols for these problems (and others).
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

How to play ANY mental game

TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.