• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Lin, Wei Xiaochao, Cai Guopeng, Wang Hao, Zheng Zhihua. An Efficient Secure Two-Party Approximate Pattern Matching Protocol[J]. Journal of Computer Research and Development, 2022, 59(8): 1819-1830. DOI: 10.7544/issn1000-1239.20210563
Citation: Xu Lin, Wei Xiaochao, Cai Guopeng, Wang Hao, Zheng Zhihua. An Efficient Secure Two-Party Approximate Pattern Matching Protocol[J]. Journal of Computer Research and Development, 2022, 59(8): 1819-1830. DOI: 10.7544/issn1000-1239.20210563

An Efficient Secure Two-Party Approximate Pattern Matching Protocol

Funds: This work was supported by the China Postdoctoral Science Foundation (2018M632712), the National Natural Science Foundation of China for Young Scientists (61802235), and the General Program of the National Natural Science Foundation of China (62071280).
More Information
  • Published Date: July 31, 2022
  • Approximate pattern matching (APM) is the most suitable for practical applications among the variants of pattern matching, whose function is to determine whether the Hamming distance between two strings is less than a given threshold value. Due to its practicality, APM has a wide range of applications in face recognition, gene matching, etc. However, owing to the sensitivity of private data, data owners are often reluctant to share their private data. Fortunately, secure approximate pattern matching (SAPM) can accomplish the matching function without revealing the data. In this paper, we propose a secure and practical approximate pattern matching protocol based on oblivious transfer (OT), homomorphic encryption (HE), oblivious polynomial evaluation (OPE) and private equality test (PEQT) for the first time, and demonstrate that the protocol has semi-honest adversary security through ideal/realistic simulation paradigm. In terms of efficiency, compared with currently available secure approximate pattern matching works, our protocol has an advantage in the aspect of computation complexity by reducing the complexity from O(nm) to O(nτ), where n is the text length, m is the pattern length, and τ is a given threshold value. Finally, to examine the efficiency, we evaluate the performance of the protocol. The performance result shows that the protocol takes only 10 s to run when the pattern length is 2\+6 and the text length is 2\+\{12\}.
  • Related Articles

    [1]Xiong Hu, Lin Ye, Yao Ting. SM9 Identity-Based Encryption Scheme with Equality Test and Cryptographic Reverse Firewalls[J]. Journal of Computer Research and Development, 2024, 61(4): 1070-1084. DOI: 10.7544/issn1000-1239.202220809
    [2]Yang Xiaodong, Zhou Hang, Ren Ningning, Yuan Sen, Wang Caifen. Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network[J]. Journal of Computer Research and Development, 2023, 60(2): 341-350. DOI: 10.7544/issn1000-1239.202110775
    [3]Wei Lifei, Liu Jihai, Zhang Lei, Wang Qin, He Chongde. Survey of Privacy Preserving Oriented Set Intersection Computation[J]. Journal of Computer Research and Development, 2022, 59(8): 1782-1799. DOI: 10.7544/issn1000-1239.20210685
    [4]Deng Xiangtian, Qian Haifeng. Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2222-2237. DOI: 10.7544/issn1000-1239.2021.20210596
    [5]Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang. Secure Multiparty Computation and Application in Machine Learning[J]. Journal of Computer Research and Development, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    [6]Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han. Privacy-Preserving Statistics Protocol for Set-Based Computation[J]. Journal of Computer Research and Development, 2020, 57(10): 2221-2231. DOI: 10.7544/issn1000-1239.2020.20200444
    [7]Wu Libing, Zhang Yubo, He Debiao. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
    [8]Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan. Survey on Private Preserving Set Intersection Technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2153-2169. DOI: 10.7544/issn1000-1239.2017.20170461
    [9]Wei Xiaochao, Jiang Han, Zhao Chuan. An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation[J]. Journal of Computer Research and Development, 2016, 53(11): 2475-2481. DOI: 10.7544/issn1000-1239.2016.20150505
    [10]Liu Tieqiao, Kuang Jishun, Cai Shuo, You Zhiqiang. A New Method of Embedding Test Patterns into Test-per-Clock Bit Stream[J]. Journal of Computer Research and Development, 2014, 51(9): 2022-2029. DOI: 10.7544/issn1000-1239.2014.20130179

Catalog

    Article views (97) PDF downloads (60) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return