Volume 16, Issue 3 (2016)                   MJEE 2016, 16(3): 14-23 | Back to browse issues page

XML Persian Abstract Print


1- Isfahan University of Technology
Abstract:   (4265 Views)
Secure outsourcing is essential to growth of cloud usage. There are some protocols allowing any functionality to be outsourced. However, specific constructions are necessary in order to do so in an efficient way. In this paper, we consider the problem of secure outsourced pattern matching. Our solution is based on Bit-Parallel Shift-ADD algorithm. The properties of this insecure algorithm allow our construction to search in an outsourced text, without revealing any non-trivial information to the computing server. We achieve a round optimal protocol that allows us to search for patterns with wildcards and handles the Hamming distance computation. Since the protocol has no leakage to the server, it cannot be optimal considering communication complexity; however, we suggest efficient techniques to achieve communication optimality through outsourcing of decryption as well. The security of our protocol is proved in the semi-honest setting. Then, in order to retain the efficiency of the protocol, we omit the correctness property in the malicious setting and prove that the scheme remains private in the presence of malicious adversaries.
Full-Text [PDF 819 kb]   (2303 Downloads)    
Article Type: Full Research Paper | Subject: پروتکلهای امنیتی
Received: 2016/08/6 | Accepted: 2016/10/1 | Published: 2017/01/24

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.