TY - GEN
T1 - Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption
AU - Yasuda, Masaya
AU - Shimoyama, Takeshi
AU - Kogure, Jun
AU - Yokoyama, Kazuhiro
AU - Koshiba, Takeshi
N1 - Copyright:
Copyright 2014 Elsevier B.V., All rights reserved.
PY - 2014
Y1 - 2014
N2 - The basic pattern matching problem is to find the locations where a pattern occurs in a text. We give several computations enabling a client to obtain matching results from a database so that the database can not learn any information about client's queried pattern. For such computations, we apply the symmetric-key variant scheme of somewhat homomorphic encryption proposed by Brakerski and Vaikuntanathan (CRYPTO 2011), which can support a limited number of both polynomial additions and multiplications on encrypted data. We also utilize the packing method introduced by Yasuda et al. (CCSW 2013) for efficiency. While they deal with only basic problems for binary vectors, we address more complex problems such as the approximate and wildcards pattern matching for non-binary vectors. To demonstrate the efficiency of our method, we implemented the encryption scheme for secure wildcards pattern matching of DNA sequences. Our implementation shows that a client can privately search real-world genomes of length 16,500 in under one second on a general-purpose PC.
AB - The basic pattern matching problem is to find the locations where a pattern occurs in a text. We give several computations enabling a client to obtain matching results from a database so that the database can not learn any information about client's queried pattern. For such computations, we apply the symmetric-key variant scheme of somewhat homomorphic encryption proposed by Brakerski and Vaikuntanathan (CRYPTO 2011), which can support a limited number of both polynomial additions and multiplications on encrypted data. We also utilize the packing method introduced by Yasuda et al. (CCSW 2013) for efficiency. While they deal with only basic problems for binary vectors, we address more complex problems such as the approximate and wildcards pattern matching for non-binary vectors. To demonstrate the efficiency of our method, we implemented the encryption scheme for secure wildcards pattern matching of DNA sequences. Our implementation shows that a client can privately search real-world genomes of length 16,500 in under one second on a general-purpose PC.
UR - http://www.scopus.com/inward/record.url?scp=84904200577&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904200577&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-08344-5_22
DO - 10.1007/978-3-319-08344-5_22
M3 - Conference contribution
AN - SCOPUS:84904200577
SN - 9783319083438
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 338
EP - 353
BT - Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Proceedings
PB - Springer Verlag
T2 - 19th Australasian Conference on Information Security and Privacy, ACISP 2014
Y2 - 7 July 2014 through 9 July 2014
ER -