Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity

Pengfei Wu, Jianting Ning*, Xinyi Huang, Joseph K. Liu

*Corresponding author for this work

Research output: Contribution to journalJournal Articlepeer-review

Abstract

Privacy-preserving pattern matching enables a user to find all occurrences of a pattern in a text without revealing any sensitive information. However, many previous works designed on homomorphic encryption suffer from expensive computational overhead and a simple way to use it can lead to potential input leakage via access pattern during the matching process. In this article, we propose a differentially oblivious pattern matching algorithm, called DOPM. It is deployed on two servers by taking a series of lightweight secret-sharing-based protocols as building blocks. In DOPM, we utilize a witness array and the single instruction multiple data (SIMD) technique to parallelize the algorithm, which achieves sublinear round complexity in performing two-party computation. Additionally, we formally define a new access pattern privacy in the context of differential privacy, named (ϵ,δ)-differentially oblivious privacy ((ϵ,δ)-DOP), and present a pair of differentially oblivious algorithms to read and write elements in an array without using oblivious shuffle. Detailed security analysis demonstrates that the proposed DOPM achieves the goal of protecting confidentiality and access pattern during the matching process. Finally, we benchmark our scheme on a real-world human genome dataset, and experimental results show that DOPM is 10.9× faster than the brute-force matching, 3.4-7.1× faster than two state-of-the-art approaches.

Original languageEnglish
Pages (from-to)4101-4117
Number of pages17
JournalIEEE Transactions on Dependable and Secure Computing
Volume20
Issue number5
DOIs
Publication statusPublished - 1 Sept 2023
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2004-2012 IEEE.

Keywords

  • Cloud-outsourced computation
  • pattern matching
  • privacy-preserving
  • secret sharing

Fingerprint

Dive into the research topics of 'Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity'. Together they form a unique fingerprint.

Cite this