4.6 Article

PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2947436

关键词

Outsourced pattern matching; privacy preserving; verifiability; efficiency; cloud computing security

资金

  1. National Natural Science Foundation of China [61602180, 61632012, 61672239]
  2. China Postdoctoral Science Foundation [2017M611502]

向作者/读者索取更多资源

This research proposes a series of protocols to achieve privacy protection and verifiability for outsourced pattern matching, effectively resisting collusion attacks between the cloud and malicious receiver/sender without utilizing public key fully homomorphic encryption.
Outsourced pattern matching delegates the task of finding all positions pattern P appears in text T to the cloud from resource-constrained devices. Unfortunately, it has brought a series of security and privacy issues. Most of the state-of-the-art either disclosed text/pattern privacy or exploited the computationally-intensive techniques of public key fully homomorphic encryption (FHE), commitment schemes and zero knowledge proof to achieve both text/pattern privacy and verifiability. To address these issues, as a building block, an efficient privacy preserving verifiable outsourced discrete fourier transform protocol OVFT is first devised based on any one-way trapdoor permutation (OWTP). Based on OVFT, we propose an efficient secure verifiable outsourced polynomial multiplication protocol OPVML which is further exploited in designing our final protocol PVOPM for verifiable privacy-preserving outsourced pattern matching. Without exploiting public key FHE, the proposed PVOPM achieves both verifiability and text/pattern privacy against the collusion between the cloud and malicious receiver/sender, by generating authentication proofs of constant size and executing constant times of any one-way trapdoor permutation, independent to both the text size n and the pattern size m. Finally, formal security proof under universal composable (UC) model and extensive evaluations demonstrate the efficiency and practicability of our proposed PVOPM.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据