scispace - formally typeset
Proceedings ArticleDOI

Secure text processing with applications to private DNA matching

TLDR
It is shown how to modify Yao's garbled circuit approach to obtain a protocol where the size of the garbling circuit is linear in the number of occurrences of p in T (rather than linear in $|T|$).
Abstract
Motivated by the problem of private DNA matching, we consider the design of efficient protocols for secure text processing. Here, informally, a party P1 holds a text T and a party P2 holds a pattern p and some additional information y, and P2 wants to learn {f(T,j,y)} for all locations j where p is found as a substring in T. (In particular, this generalizes the basic pattern matching problem.) We aim for protocols with full security against a malicious P2 that also preserve privacy against a malicious P1 (i.e., one-sided security). We show how to modify Yao's garbled circuit approach to obtain a protocol where the size of the garbled circuit is linear in the number of occurrences of p in T (rather than linear in $|T|$). Along the way we show a new keyword search protocol that may be of independent interest.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Foundations of garbled circuits

TL;DR: In this paper, the authors provide a provable-security treatment for garbling schemes, endowing them with a versatile syntax and multiple security definitions, including privacy, obliviousness, and authenticity.
Posted Content

Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes (Full Version)

TL;DR: This paper begins to address genomic privacy by focusing on three important applications: Paternity Tests, Personalized Medicine, and Genetic Compatibility Tests, and proposes a set of efficient techniques based on private set operations that allow in in silico some operations that are currently performed via in vitro methods, in a secure fashion.
Proceedings ArticleDOI

Countering GATTACA: efficient and secure testing of fully-sequenced human genomes

TL;DR: In this paper, a set of efficient techniques based on private set operations is proposed for paternity tests, personalized medicine, and genetic compatibility tests, which can be implemented in in silico some operations that are currently performed via in vitro methods in a secure fashion.
Proceedings ArticleDOI

Secure pattern matching using somewhat homomorphic encryption

TL;DR: This paper makes use of the somewhat homomorphic encryption scheme presented by Lauter, Naehrig and Vaikuntanathan (ACM CCSW 2011), which supports a limited number of both additions and multiplications on encrypted data and proposes a new packing method suitable for an efficient computation of multiple Hamming distance values onencrypted data.
Book ChapterDOI

(If) size matters: size-hiding private set intersection

TL;DR: The notion of size-hiding private set intersection (SHI-PSI) was introduced in this paper, where the size of the set held by one of the two parties is hidden from the other parties.
References
More filters
Proceedings ArticleDOI

How to play ANY mental game

TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.
Proceedings ArticleDOI

How to generate and exchange secrets

TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.
Proceedings Article

How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority

TL;DR: Permission to copy without fee all or part of this material is granted provided that the copies are not made or Idistributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machimery.
MonographDOI

Foundations of Cryptography

TL;DR: In this paper, the authors present a list of figures in the context of digital signatures and message authentication for general cryptographic protocols, including encryption, digital signatures, message authentication, and digital signatures.
Book

Foundations of Cryptography: Volume 2, Basic Applications

TL;DR: This second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols.