Fuzzy Private Matching

نویسندگان

  • Lukasz Chmielewski
  • Jaap-Henk Hoepman
چکیده

In the private matching problem, a client and a server each hold a set of n elements as their input. The client wants to privately compute the intersection of these two sets: the client learns the elements it has in common with server (and nothing more), while the server obtains no information at all. In certain applications it would be useful to have a private matching protocol that reports a match even if two elements are only similar instead of equal. Such a private matching protocol is called fuzzy, and is useful, for instance, when elements may be inaccurate or corrupted by errors. We consider the fuzzy private matching problem, in a semi-honest environment. Elements are similar if they match on t out of T attributes. First we show that the original solution proposed by Freedman et al. [FNP04] is not private: the client can “steal” elements even if the sets have no similar elements in common. Following that we present 2 fuzzy private matching protocols. The first, simple, protocol has message complexity O(n ` T t ́ ). The second, improved, protocol has message complexity O(nT ), but here the client incurs a O(n ` T t ́ ) time complexity penalty.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

2015 5th International Conference on IT Convergence and Security (ICITCS)

This paper proposes a new double-private protocol for fuzzy matching and -fuzzy matching. Many works have been done for private database search in which the keyword that a user inputs for the search is concealed to the database owner. In these database searches, the exactly matched data are returned to the user. Fuzzy matching has been proposed in which not exactly matched but nearly matched da...

متن کامل

ar X iv : 0 71 0 . 54 25 v 1 [ cs . C R ] 2 9 O ct 2 00 7 Fuzzy Private Matching ( Extended

In the private matching problem, a client and a server each hold a set of n input elements. The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all. In certain applications it would be useful to have a private matching protocol that reports a match even if...

متن کامل

Fuzzy Private Matching ( Extended

In the private matching problem, a client and a server each hold a set of n input elements. The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all. In certain applications it would be useful to have a fuzzy private matching protocol that reports a match e...

متن کامل

Efficient Fuzzy Matching and Intersection on Private Datasets

At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T . In the conclusion of thei...

متن کامل

Secure Remote Authentication Using Fingerprint and Fuzzy Private Matching

A remote authentication scheme is proposed, which enables the use of fingerprint and fuzzy private matching protocol to achieve mutual authentication over an insecure channel. The private fingerprint template in the scheme is in the form of polynomial and is cancelable. Better performance and efficiency of the scheme than the existing schemes can be expected. In addition, the privacies of the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006