Secure parameterized pattern matching

被引:2
作者
Zarezadeh, Maryam [1 ]
Mala, Hamid [1 ]
Ladani, Behrouz Tork [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Parameterized pattern matching; Secure computation; UC-secure; Simulation-based security; Privacy-preserving; Secure pattern matching; EFFICIENT; PROTOCOLS; ALGORITHMS;
D O I
10.1016/j.ins.2020.02.046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Parameterized pattern matching (PPM) is the problem of matching between two given parameterized strings over two constant and parameter alphabets. PPM has special applications in software maintenance, information retrieval, computational biology, and so on. In some applications of PPM, preserving the privacy of the involved parties is essential. For example, a researcher holding an amino acid pattern needs to receive the parameterized matched locations of his/her input with the patterns in a biological database while the database owner has to obtain no information about the matching results and the pattern. In this paper, we define this problem as secure PPM (SPPM), present a scheme to resolve it in the semi-honest and malicious adversarial models, and prove the security of the proposed scheme in the universal composability (UC) framework. The proposed scheme supports wildcard and approximate PPM, too. We evaluate the security and performance of the proposed scheme. The proposed scheme is experimentally evaluated on a case of secure ribonucleic acid (RNA) search over the RNAcentral dataset. Implementation results show that the proposed scheme is secure and efficient for preserving privacy in contexts where PPM is applicable. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:299 / 316
页数:18
相关论文
共 47 条
[1]  
[Anonymous], 2016, PYTHON PAILLIER 1 2
[2]  
[Anonymous], 1989, CRYPTO 1989, DOI DOI 10.1007/0-387-34805-0'22
[3]  
Asharov G., 2013, P 2013 ACM SIGSAC C, P535, DOI DOI 10.1145/2508859.2516738
[4]  
Atallah M.J., 2003, ACM WPES 2003, P39
[5]  
BAEZAYATES RA, 1989, SIGIR FORUM, V23, P168, DOI 10.1145/75335.75352
[6]  
Baker B. S., 1993, Computing Science and Statistics, V24, P49
[7]   Parameterized duplication in strings: Algorithms and an application to software maintenance [J].
Baker, BS .
SIAM JOURNAL ON COMPUTING, 1997, 26 (05) :1343-1362
[8]   Parameterized pattern matching: Algorithms and applications [J].
Baker, BS .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1996, 52 (01) :28-42
[9]  
Baron Joshua, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P222, DOI 10.1007/978-3-642-32928-9_13
[10]   RNAcentral: A vision for an international database of RNA sequences [J].
Bateman, Alex ;
Agrawal, Shipra ;
Birney, Ewan ;
Bruford, Elspeth A. ;
Bujnicki, Janusz M. ;
Cochrane, Guy ;
Cole, James R. ;
Dinger, Marcel E. ;
Enright, Anton J. ;
Gardner, Paul P. ;
Gautheret, Daniel ;
Griffiths-Jones, Sam ;
Harrow, Jen ;
Herrero, Javier ;
Holmes, Ian H. ;
Huang, Hsien-Da ;
Kelly, Krystyna A. ;
Kersey, Paul ;
Kozomara, Ana ;
Lowe, Todd M. ;
Marz, Manja ;
Moxon, Simon ;
Pruitt, Kim D. ;
Samuelsson, Tore ;
Stadler, Peter F. ;
Vilella, Albert J. ;
Vogel, Jan-Hinnerk ;
Williams, Kelly P. ;
Wright, Mathew W. ;
Zwieb, Christian .
RNA, 2011, 17 (11) :1941-1946