Solution space adjustable CNF obfuscation for privacy-preserving SAT solving

被引:4
作者
Qin, Ying [1 ]
Ding, Yan [1 ]
Tan, Yusong [1 ]
Wu, Qingbo [1 ]
机构
[1] Natl Univ Def Technol, Changsha, Hunan, Peoples R China
来源
2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS | 2018年
关键词
SAT; obfuscation; privacy preserving; CNF; SECURE;
D O I
10.1109/BDCloud.2018.00015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the problem of privacy-preserving SAT solving in the cloud computing paradigm. We present a novel Husk formula based CNF obfuscation algorithm and its corresponding solution recovery algorithm, to prevent unauthorized third party in cloud obtaining sensitive information. By obfuscation, the CNF formula is transformed into another formula with over-approximated solution space. Solution of the original CNF can be extracted from the solution of obfuscated CNF by projection based solution recovery algorithm. By customizing the Husk formula, we make solution space of obfuscated CNF adjustable to control the ratio of false solution introduced by Obfuscation, to satisfying performance requiments. Theoretical analysis demonstrates that, with the aid of Cubic Husks formula, obfuscation algorithm can not only change the structure of CNF formula with polynomial time complexity, but also construct an adjustable over-approximated solution space. While solution recovery algorithm can filter out solution with linear time complexity. Experimental results on ISCAS89 benchmark show that obfuscation incurs acceptable negative impact on the performance of SAT solving.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 30 条
  • [1] Achlioptas D, 2000, SEVENTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-2001) / TWELFTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-2000), P256
  • [2] [Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
  • [3] Atallah MJ, 2001, ADV COMPUT, V54, P215
  • [4] Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
  • [5] Brakerski Zvika., 2014, Innovations in Theoretical Computer Science, ITCS, P235
  • [6] CLARKE EM, 2000, COMPUTER AIDED VERIF, P154, DOI DOI 10.1007/10722167_15
  • [7] A COMPUTING PROCEDURE FOR QUANTIFICATION THEORY
    DAVIS, M
    PUTNAM, H
    [J]. JOURNAL OF THE ACM, 1960, 7 (03) : 201 - 215
  • [8] Du WL, 2005, LECT NOTES COMPUT SC, V3531, P122
  • [9] Extracting logic circuit structure from Conjunctive Normal Form descriptions
    Fu, Zhaohui
    Malik, Sharad
    [J]. 20TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: TECHNOLOGY CHALLENGES IN THE NANOELECTRONICS ERA, 2007, : 37 - +
  • [10] Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25