Fuzzy Private Matching
نویسندگان
چکیده
In the private matching problem, a client and a server each hold a set of n elements as their input. The client wants to privately compute the intersection of these two sets: the client learns the elements it has in common with server (and nothing more), while the server obtains no information at all. In certain applications it would be useful to have a private matching protocol that reports a match even if two elements are only similar instead of equal. Such a private matching protocol is called fuzzy, and is useful, for instance, when elements may be inaccurate or corrupted by errors. We consider the fuzzy private matching problem, in a semi-honest environment. Elements are similar if they match on t out of T attributes. First we show that the original solution proposed by Freedman et al. [FNP04] is not private: the client can “steal” elements even if the sets have no similar elements in common. Following that we present 2 fuzzy private matching protocols. The first, simple, protocol has message complexity O(n ` T t ́ ). The second, improved, protocol has message complexity O(nT ), but here the client incurs a O(n ` T t ́ ) time complexity penalty.
منابع مشابه
2015 5th International Conference on IT Convergence and Security (ICITCS)
This paper proposes a new double-private protocol for fuzzy matching and -fuzzy matching. Many works have been done for private database search in which the keyword that a user inputs for the search is concealed to the database owner. In these database searches, the exactly matched data are returned to the user. Fuzzy matching has been proposed in which not exactly matched but nearly matched da...
متن کاملar X iv : 0 71 0 . 54 25 v 1 [ cs . C R ] 2 9 O ct 2 00 7 Fuzzy Private Matching ( Extended
In the private matching problem, a client and a server each hold a set of n input elements. The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all. In certain applications it would be useful to have a private matching protocol that reports a match even if...
متن کاملFuzzy Private Matching ( Extended
In the private matching problem, a client and a server each hold a set of n input elements. The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all. In certain applications it would be useful to have a fuzzy private matching protocol that reports a match e...
متن کاملEfficient Fuzzy Matching and Intersection on Private Datasets
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T . In the conclusion of thei...
متن کاملSecure Remote Authentication Using Fingerprint and Fuzzy Private Matching
A remote authentication scheme is proposed, which enables the use of fingerprint and fuzzy private matching protocol to achieve mutual authentication over an insecure channel. The private fingerprint template in the scheme is in the form of polynomial and is cancelable. Better performance and efficiency of the scheme than the existing schemes can be expected. In addition, the privacies of the s...
متن کامل