Efficient and secure pattern matching with wildcards using lightweight cryptography

Abstract Many secure protocols exist for the problem of determining occurrences of a pattern P as a substring of a text string T . That is, when Alice has T , and Bob has P , the protocol computes the answer(s) without revealing to Alice or Bob anything that cannot be deduced from the jointly computed answer. The existing protocols work for various adversarial models (some use the powerful malicious model), but they all have drawbacks that detract from practical deployment. For some, the drawback is their quadratic computation time (proportional to | T || P |), for others, it is their use of expensive cryptographic primitives such as homomorphic encryption; some have both drawbacks. Moreover, some restrict alphabet and input size to be bounded by a polynomial in a security parameter. This paper presents a scheme that overcomes these drawbacks in that it works for arbitrary alphabet and input sizes, has O ( | T | log | P | ) computational cost, does not use expensive cryptographic primitives, and has information-theoretic security (one-time pad). It can also handle single-character wildcards (symbols that match any alphabet symbol). These improvements come at the cost of using a weaker adversarial model than the malicious one (the semi-honest), and an offline helper (e.g., cloud server) that computes and provides Alice and Bob with randoms that they can subsequently use in protocols. We implemented our scheme, that we call LiLiP ( Li ghtweight, Li nearithmic & P rivate), and it performs very well in practice.

[1]  Karl R. Abrahamson Generalized String Matching , 1987, SIAM J. Comput..

[2]  Raphaël Clifford,et al.  Simple deterministic wildcard matching , 2007, Inf. Process. Lett..

[3]  Takeshi Koshiba,et al.  An Enhancement of Privacy-Preserving Wildcards Pattern Matching , 2016, FPS.

[4]  Keith B. Frikken Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation , 2009, DBSec.

[5]  Stefan Wolf,et al.  Oblivious Transfer Is Symmetric , 2006, EUROCRYPT.

[6]  Wenliang Du,et al.  Searching for High-Value Rare Events with Uncheatable Grid Computing , 2005, ACNS.

[7]  Rafail Ostrovsky,et al.  5PM: Secure Pattern Matching , 2012, SCN.

[8]  Mikhail J. Atallah,et al.  A Randomized Algorithm for Approximate String Matching , 2001, Algorithmica.

[9]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[10]  Carmit Hazay,et al.  Computationally Secure Pattern Matching in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.

[11]  M. Fischer,et al.  STRING-MATCHING AND OTHER PRODUCTS , 1974 .

[12]  V AhoAlfred,et al.  Efficient string matching , 1975 .

[13]  Yehuda Lindell,et al.  Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, TCC.

[14]  Yehuda Lindell,et al.  Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, TCC.

[15]  Takeshi Koshiba,et al.  Secure pattern matching using somewhat homomorphic encryption , 2013, CCSW.

[16]  Damien Vergnaud Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform , 2011, AFRICACRYPT.

[17]  Takeshi Koshiba,et al.  Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption , 2014, ACISP.

[18]  Farinaz Koushanfar,et al.  PriSearch: Efficient search on private data , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).

[19]  Stefan Katzenbeisser,et al.  Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.

[20]  Ronald L. Rivest,et al.  Chaffing and Winnowing: Confidentiality without Encryption , 2012 .