5PM: 5ecure Pattern Matching
نویسندگان
چکیده
In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of matching is more general and includes non-binary alphabets, non-binary Hamming distance and non-binary substring matching. 5PM is the first secure expressive pattern matching protocol designed to optimize round complexity by carefully specifying the entire protocol round by round. In the malicious model, 5PM requires O((m+ n)k) bandwidth and O(m+ n) encryptions, where m is the pattern length and n is the text length. Further, 5PM can hide pattern size with no asymptotic additional costs in either computation or bandwidth. Finally, 5PM requires only two rounds of communication in the honest-but-curious model and eight rounds in the malicious model. Our techniques reduce pattern matching and generalized Hamming distance problems to a novel linear algebra formulation that allows for generic solutions based on any additively homomorphic encryption. We believe our efficient algebraic techniques are of independent interest.
منابع مشابه
5PM: Secure Pattern Matching
In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of matching is more general and includes non-...
متن کاملSpecial Issue: Advances in Security for Communication Networks
The success of the Internet and of communication networks in general, opened new intriguing challenges for protocol designers. Consider, for example, the classic notion of “secure computation” introduced and achieved in the seminal works of Yao and of Goldreich, Micali and Wigderson. While such a notion considers only the stand-alone setting, where parties are connected to each other but isolat...
متن کاملLocal Derivative Pattern with Smart Thresholding: Local Composition Derivative Pattern for Palmprint Matching
Palmprint recognition is a new biometrics system based on physiological characteristics of the palmprint, which includes rich, stable, and unique features such as lines, points, and texture. Texture is one of the most important features extracted from low resolution images. In this paper, a new local descriptor, Local Composition Derivative Pattern (LCDP) is proposed to extract smartly stronger...
متن کاملEECS 70 Discrete Mathematics and Probability Theory Spring 2013
Mark Here Section Time Location GSI 1 9-10am 6 Evans Ramtin 2 10-11am 71 Evans Ramtin 3 11-12pm 71 Evans Nima 4 12-1pm 2 Evans Nima 5 1-2pm 87 Evans Sridhar 6 2-3pm 2070 VLSB Sridhar 7 3-4pm 85 Evans Chung-Wei 8 4-5pm 9 Evans Chung-Wei 9 5-6pm 9 Evans Richard 10 1-2pm 3105 Etch. Chenyu 11 2-3pm 151 Barr. Kate 12 4-5pm B51 Hilde. Richard 13 6-7pm 70 Evans Sibi 14 12-1pm 101 Wheel. Chenyu 15 4-5p...
متن کاملThe Effect of P - selectin Pattern Width on HL - 60 Cell Roling Behavior
The effect of varying the width of P-selectin band patterns on the rolling behavior of HL60 myeloid cells along edges of the band patterns was studied. The P-selectin and polyethylene glycol (PEG) pattern was produced via microcontact printing using a polydimethylsiloxane (PDMS) stamp. HL-60 cells were flowed across the pattern using a syringe pump at low and high volume flow rates, and the len...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012