Pattern Matching Encryption
نویسندگان
چکیده
In this paper, we consider a setting where a user wants to outsource storage of a large amount of private data, and then perform pattern matching queries on the data; that is, given a data string s and a “pattern” string p, find all occurrences of p as a substring of s. We formalize the security properties desired in this type of setting by defining a type of encryption called queryable encryption. In a queryable encryption scheme, a user can encrypt a message M under a secret key, and using the secret key can generate tokens for queries q. Applying a token for a query q to an encryption of M gives the answer to the query q on M . We consider security against both honest-butcurious and malicious adversaries, and define properties guaranteeing both the correctness of the user’s results and the privacy of the user’s data. Following the line of work started by [CGKO06], to allow for efficient constructions, we allow the protocol to leak some information about the user’s data, however we ensure that this leakage can be precisely captured in the definition. In addition, we allow the query protocol to involve a small constant number of rounds of interaction. We construct a queryable encryption scheme for pattern matching queries that is correct and secure in the malicious model. Our construction is based on efficient symmetric-key building blocks and scales well with the size of the input: encryption of a data string of length n with security parameter λ takes O(n) time and produces a ciphertext of size O(nλ), and a query for a pattern string of length m that occurs k times takes O(m+ k) time and three rounds of communication.
منابع مشابه
5PM: 5ecure Pattern Matching
In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of matching is more general and includes non-...
متن کامل5PM: Secure Pattern Matching
In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of matching is more general and includes non-...
متن کاملASCII KS Discrete Matcher: A Different and a New Approach to String Matching using Pattern in Discrete Manner
Many researchers have implemented string matching algorithms in various fields for instance finding the secret key RSA or other encryption methods as well as finding intruder's pattern in Intrusion Detection System, DNA matching, Carbon Chain matching. This paper aims to analyze and obtain an algorithm for discrete pattern matching. It also works for any type of string whether it be charac...
متن کاملStudy of Malware Based On Pattern Matching Techniques
Malware is security threat that can break computer operation without knowing user’s information and it is difficult to identify its behavior. We can use signature based matching technique, encryption and decryption engines, metamorphism based method and KNN (Knearest neighbor) algorithm to identify the behavior of malware. Among all these techniques a pattern based technique is well famous for ...
متن کاملPattern Matching Techniques and Their Applications to Computational Molecular Biology - A Review
Pattern matching techniques have been useful in solving many problems associated with computer science, including data compression (Chrochemore and Lecroq, 1996), data encryption (RSA Laboratories, 1993), and computer vision (Grimson and Huttenlocher, 1990). In recent years, developments in molecular biology have led to large scale sequencing of genomic DNA. Since this data is being produced in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014