Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines

We propose protocols for obliviously evaluating finite-state machines, i.e., the evaluation is shared between the provider of the finite-state machine and the provider of the input string in such a manner that neither party learns the other’s input, and the states being visited are hidden from both. For alphabet size |Σ|, number of states |Q|, and input length n, previous solutions have either required a number of rounds linear in n or communication Ω(n|Σ||Q| log |Q|). Our solutions require 2 rounds with communication O(n(|Σ|+|Q| log |Q|)). We present two different solutions to this problem, a two-party one and a setting with an untrusted but non-colluding helper.

[1]  Marina Blanton,et al.  Secure Outsourcing of DNA Searching via Finite Automata , 2010, DBSec.

[2]  Anderson C. A. Nascimento,et al.  Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation , 2019, IEEE Transactions on Dependable and Secure Computing.

[3]  Hiroki Arimura,et al.  Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome Detection , 2014, WPES.

[4]  Erkay Savas,et al.  Bandwidth-Optimized Parallel Private Information Retrieval , 2014, SIN.

[5]  Martine De Cock,et al.  Privacy-Preserving Feature Selection with Secure Multiparty Computation , 2021, IACR Cryptol. ePrint Arch..

[6]  Martine De Cock,et al.  Private Speech Characterization with Secure Multiparty Computation , 2020, ArXiv.

[7]  Matt J. Kusner,et al.  QUOTIENT: Two-Party Secure Neural Network Training and Prediction , 2019, CCS.

[8]  Michael K. Reiter,et al.  Toward practical encrypted email that supports private, regular-expression searches , 2015, International Journal of Information Security.

[9]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[10]  Daniel Escudero,et al.  Secure training of decision trees with continuous attributes , 2020, IACR Cryptol. ePrint Arch..

[11]  Marcel Keller,et al.  Secure Evaluation of Quantized Neural Networks , 2019, IACR Cryptol. ePrint Arch..

[12]  Dongrui Wu,et al.  Protecting Privacy of Users in Brain-Computer Interface Applications , 2019, IEEE Transactions on Neural Systems and Rehabilitation Engineering.

[13]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[14]  Martine De Cock,et al.  Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection , 2019, IACR Cryptol. ePrint Arch..

[15]  Martine De Cock,et al.  High performance logistic regression for privacy-preserving genome analysis , 2020, BMC Medical Genomics.

[16]  Jan Willemson,et al.  Universally composable privacy preserving finite automata execution with low online and offline complexity , 2013, IACR Cryptol. ePrint Arch..

[17]  Keith B. Frikken Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation , 2009, DBSec.

[18]  Babak Sadeghiyan,et al.  An Efficient Protocol for Oblivious DFA Evaluation and Applications , 2012, CT-RSA.

[19]  Martine De Cock,et al.  Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[20]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[21]  Ping Chen,et al.  Practical Secure Decision Tree Learning in a Teletreatment Application , 2014, Financial Cryptography.

[22]  Farinaz Koushanfar,et al.  XONN: XNOR-based Oblivious Deep Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..

[23]  Michael K. Reiter,et al.  Third-Party Private DFA Evaluation on Encrypted Files in the Cloud , 2012, ESORICS.

[24]  Anderson C. A. Nascimento,et al.  Privacy-preserving training of tree ensembles over continuous data , 2021, IACR Cryptol. ePrint Arch..

[25]  Martine De Cock,et al.  Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data , 2015, AISec@CCS.

[26]  Aseem Rastogi,et al.  CrypTFlow2: Practical 2-Party Secure Inference , 2020, IACR Cryptol. ePrint Arch..

[27]  Anderson C. A. Nascimento,et al.  Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation , 2021, IACR Cryptol. ePrint Arch..

[28]  Yao Lu,et al.  Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..

[29]  Stefan Katzenbeisser,et al.  Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.

[30]  Sameer Wagh,et al.  SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..

[31]  Martine De Cock,et al.  Privacy-Preserving Video Classification with Convolutional Neural Networks , 2021, IACR Cryptol. ePrint Arch..

[32]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[33]  Nishant Kumar,et al.  CrypTFlow: Secure TensorFlow Inference , 2020, 2020 IEEE Symposium on Security and Privacy (SP).