Pattern Matching Encryption

نویسندگان

  • Melissa Chase
  • Emily Shen
چکیده

In this paper, we consider a setting where a user wants to outsource storage of a large amount of private data, and then perform pattern matching queries on the data; that is, given a data string s and a “pattern” string p, find all occurrences of p as a substring of s. We formalize the security properties desired in this type of setting by defining a type of encryption called queryable encryption. In a queryable encryption scheme, a user can encrypt a message M under a secret key, and using the secret key can generate tokens for queries q. Applying a token for a query q to an encryption of M gives the answer to the query q on M . We consider security against both honest-butcurious and malicious adversaries, and define properties guaranteeing both the correctness of the user’s results and the privacy of the user’s data. Following the line of work started by [CGKO06], to allow for efficient constructions, we allow the protocol to leak some information about the user’s data, however we ensure that this leakage can be precisely captured in the definition. In addition, we allow the query protocol to involve a small constant number of rounds of interaction. We construct a queryable encryption scheme for pattern matching queries that is correct and secure in the malicious model. Our construction is based on efficient symmetric-key building blocks and scales well with the size of the input: encryption of a data string of length n with security parameter λ takes O(n) time and produces a ciphertext of size O(nλ), and a query for a pattern string of length m that occurs k times takes O(m+ k) time and three rounds of communication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

5PM: 5ecure Pattern Matching

In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of matching is more general and includes non-...

متن کامل

5PM: Secure Pattern Matching

In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of matching is more general and includes non-...

متن کامل

ASCII KS Discrete Matcher: A Different and a New Approach to String Matching using Pattern in Discrete Manner

Many researchers have implemented string matching algorithms in various fields for instance finding the secret key RSA or other encryption methods as well as finding intruder's pattern in Intrusion Detection System, DNA matching, Carbon Chain matching. This paper aims to analyze and obtain an algorithm for discrete pattern matching. It also works for any type of string whether it be charac...

متن کامل

Study of Malware Based On Pattern Matching Techniques

Malware is security threat that can break computer operation without knowing user’s information and it is difficult to identify its behavior. We can use signature based matching technique, encryption and decryption engines, metamorphism based method and KNN (Knearest neighbor) algorithm to identify the behavior of malware. Among all these techniques a pattern based technique is well famous for ...

متن کامل

Pattern Matching Techniques and Their Applications to Computational Molecular Biology - A Review

Pattern matching techniques have been useful in solving many problems associated with computer science, including data compression (Chrochemore and Lecroq, 1996), data encryption (RSA Laboratories, 1993), and computer vision (Grimson and Huttenlocher, 1990). In recent years, developments in molecular biology have led to large scale sequencing of genomic DNA. Since this data is being produced in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014