Automata Evaluation and Text Search Protocols with Simulation-Based Security

被引:1
作者
Gennaro, Rosario [1 ]
Hazay, Carmit [2 ]
Sorensen, Jeffrey S. [3 ]
机构
[1] CUNY City Coll, New York, NY 10031 USA
[2] Bar Ilan Univ, Fac Engn, Ramat Gan, Israel
[3] Google, New York, NY USA
关键词
Text search; Oblivious automata evaluation; Simulation-based security; COMPUTATION;
D O I
10.1007/s00145-014-9193-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents efficient protocols for securely computing the following two problems: (1) The fundamental problem of pattern matching. This problem is defined in the two-party setting, where party holds a pattern and party holds a text. The goal of is to learn where the pattern appears in the text, without revealing it to or learning anything else about 's text. This problem has been widely studied for decades due to its broad applicability. We present several protocols for several notions of security. We further generalize one of our solutions to solve additional pattern matching-related problems of interest. (2) Our construction from above, in the malicious case, is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem, party holds an automaton and party holds an input string, and they need to decide whether the automaton accepts the input, without learning anything else. Our protocol obtains full security in the face of malicious adversaries.
引用
收藏
页码:243 / 282
页数:40
相关论文
共 36 条
[1]  
Allauzen C, 1999, LECT NOTES COMPUT SC, V1725, P295
[2]  
Amir A, 2000, PROCEEDINGS OF THE ELEVENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P794
[3]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[4]  
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[5]  
[Anonymous], J CRYPTOLOGY
[6]  
[Anonymous], 2001, FDN CRYPTOGRAPHY BAS
[7]  
Baron Joshua, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P222, DOI 10.1007/978-3-642-32928-9_13
[8]  
Bayer S, 2012, LECT NOTES COMPUT SC, V7237, P263, DOI 10.1007/978-3-642-29011-4_17
[9]  
Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1
[10]   FAST STRING SEARCHING ALGORITHM [J].
BOYER, RS ;
MOORE, JS .
COMMUNICATIONS OF THE ACM, 1977, 20 (10) :762-772