DocumentCode :
2488661
Title :
Privacy preserving string comparisons based on Levenshtein distance
Author :
Rane, Shantanu ; Sun, Wei
Author_Institution :
Mitsubishi Electr. Res. Labs., Cambridge, MA, USA
fYear :
2010
fDate :
12-15 Dec. 2010
Firstpage :
1
Lastpage :
6
Abstract :
Alice and Bob possess strings x and y of length m and n respectively and want to compute the Levenshtein distance L(x, y) between the strings under privacy and communication constraints. The Levenshtein distance, or edit distance, has a dynamic programming formulation that solves a series of minimum-finding problems. Based on this formulation, there are known symmetric privacy-preserving protocols for the computation of L(x, y), in which the two parties incur equal protocol overhead. In this work, we propose an asymmetric two-party protocol in which a lightweight client Bob with a string y interacts with a single powerful server Alice containing string x in its database. We present a privacy-preserving minimum-finding protocol based on semantically secure homomorphic functions and additive secret sharing. This protocol is executed repeatedly, to enable private computation of the edit distance. Our protocol supports arbitrary finite insertion/deletion costs and a variety of substitution costs. While Alice requires similar effort as in previous approaches, the advantage is that Bob incurs far fewer ciphertext operations and transmissions, making the protocol well-suited for client-server querying applications.
Keywords :
cryptographic protocols; data communication; data privacy; dynamic programming; public key cryptography; string matching; Levenshtein distance; String Comparisons; additive secret sharing; arbitrary finite insertion-deletion; ciphertext operations; ciphertext transmissions; client-server querying applications; communication constraints; dynamic programming; edit distance; lightweight client Bob; privacy-preserving protocols; Additives; Cryptography; Dynamic programming; Privacy; Protocols; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Forensics and Security (WIFS), 2010 IEEE International Workshop on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4244-9078-3
Type :
conf
DOI :
10.1109/WIFS.2010.5711449
Filename :
5711449
Link To Document :
بازگشت