4.7 Article

Secure approximate pattern matching protocol via Boolean threshold private set intersection

期刊

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
卷 37, 期 11, 页码 9245-9266

出版社

WILEY
DOI: 10.1002/int.22990

关键词

Boolean threshold private set intersection; oblivious transfer; secure approximate pattern matching; threshold private set intersection

资金

  1. China Postdoctoral Science Foundation [2018M632712]
  2. National Natural Science Foundation of China for Young Scientists [61802235]

向作者/读者索取更多资源

This paper proposes a secure protocol for approximate pattern matching to address the privacy concerns in sharing genetic data. The authors first introduce the Boolean threshold private set intersection (BTPSI) functionality and develop a secure protocol for it. They then combine oblivious transfer with BTPSI in a semi-honest model to achieve an efficient construction of secure approximate pattern matching (SAPM) protocol. The performance experiment shows that the protocol has a low runtime when the length of the text and pattern are within certain ranges.
Approximate pattern matching (APM) measures whether the Hamming distance between two strings is less than a threshold value. APM has been widely utilized, such as gene matching and facial recognition. Yet, the genetic data are privacy-sensitive, resulting that the owners are unwilling to share the raw data. This inspires us to explore how to securely perform APM. After revisiting threshold private set intersection (TPSI), we first propose and formalize a functionality named Boolean threshold private set intersection (BTPSI). The new proposed BTPSI primitive returns a Boolean value (0 or 1) to the user, rather than the actual elements in TPSI. We then construct a secure protocol for the BTPSI functionality with semihonest security. Besides, we first combine oblivious transfer and BTPSI to achieve the efficient construction of secure approximate pattern matching (SAPM) protocol in a semihonest model. Furthermore, we implement our SAPM protocol to demonstrate its real practicality. The performance result shows that when the text length is 2 20 ${2}<^>{20}$ and the pattern length is 2 10 ${2}<^>{10}$, the total runtime is less than 3 s.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据