scispace - formally typeset
Proceedings ArticleDOI

Privacy preserving error resilient dna searching through oblivious automata

TLDR
A new error-resilient privacy-preserving string searching protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.
Abstract
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and personalized nature of this information highlights the need for privacy-preserving protocols. In this paper, we present a new error-resilient privacy-preserving string searching protocol that is suitable for running private DNA queries. This protocol checks if a short template (e.g., a string that describes a mutation leading to a disease), known to one party, is present inside a DNA sequence owned by another party, accounting for possible errors and without disclosing to each party the other party's input. Each query is formulated as a regular expression over a finite alphabet and implemented as an automaton. As the main technical contribution, we provide a protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.

read more

Citations
More filters
Journal ArticleDOI

SWMQ: Secure wildcard pattern matching with query

TL;DR: This study focuses on the efficient construction of SWMQ in the semihonest adversary setting, and proposes two new primitives, hereafter referred to as shared wildcard pattern matching (Sh‐WPM) and choice‐sharing oblivious transfer (CSOT).
Patent

Secure multi-dimensional pattern matching for secure search and recognition

TL;DR: In this article, a protocol for multi-dimensional secure pattern matching is proposed, where the security and privacy requirements are that P2 does not learn any information about the pattern p nor the result of the matching.

Data Leak Detection As a Service: Challenges and Solutions

TL;DR: How cloud providers can offer their customers data-leak detection as an add-on service with strong privacy guarantees is described and a quantifiable method to measure the privacy guarantee offered by the fuzzy fingerprint framework is provided.
Journal Article

Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing.

TL;DR: This paper presents the refereed computation delegation scheme of sequence comparison using multiple servers and shows that this scheme clearly outperforms the existing schemes in terms of efficiency.
Proceedings ArticleDOI

Privacy-preserving path-inclusion protocol through oblivious automata

TL;DR: An efficient protocol for securely computing the path-inclusion problem, defined in the two parties setting, where Alice and Bob both have a path, is proposed, based on an automata evaluation sub-protocol.
References
More filters
Book

Dynamic Programming

TL;DR: The more the authors study the information processing aspects of the mind, the more perplexed and impressed they become, and it will be a very long time before they understand these processes sufficiently to reproduce them.
Book

Introduction to Automata Theory, Languages, and Computation

TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Journal ArticleDOI

A general method applicable to the search for similarities in the amino acid sequence of two proteins

TL;DR: A computer adaptable method for finding similarities in the amino acid sequences of two proteins has been developed and it is possible to determine whether significant homology exists between the proteins to trace their possible evolutionary development.