Efficient Post-Quantum Pattern Matching on Encrypted Data

Author:

Bkakria Anis1ORCID,Izabachène Malika2ORCID

Affiliation:

1. IRT SystemX

2. Unaffiliated

Abstract

Pattern matching methods are essential in various applications where users must disclose highly sensitive information. Among these applications are genomic data analysis, financial records inspection, and intrusion detection processes, all of which necessitate robust privacy protection mechanisms. Balancing the imperative of protecting the confidentiality of analyzed data with the need for efficient pattern matching presents a significant challenge. In this paper, we propose an efficient post-quantum secure construction that enables arbitrary pattern matching over encrypted data while ensuring the confidentiality of the data to be analyzed. In addition, we address scenarios where a malicious data sender, intended to send an encrypted content for pattern detection analysis, has the ability to modify the encrypted content. We adapt the data fragmentation technique to handle such a malicious sender. Our construction makes use of a well-suited Homomorphic Encryption packing method in the context of fragmented streams and combines homomorphic operations in a leveled mode (i.e. without bootstrapping) to obtain a very efficient pattern matching detection process. In contrast to the most efficient state-of-the-art scheme, our construction achieves a significant reduction in the time required for encryption, decryption, and pattern matching on encrypted data. Specifically, our approach decreases the time by factors of 1850 , 10 6 , and 245 , respectively, for matching a single pattern, and by factors of 115 , 10 5 , and 12 , respectively, for matching 2 10 patterns.

Publisher

International Association for Cryptologic Research

Reference23 articles.

1. A fully homomorphic encryption scheme;Craig Gentry,2009

2. Fully homomorphic encryption using ideal lattices;Craig Gentry,2009

3. Functional encryption: Definitions and challenges;Dan Boneh,2011

4. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions;Michel Abdalla;Journal of cryptology,2008

5. Substring-Searchable Symmetric Encryption.;Melissa Chase;Proc. Priv. Enhancing Technol.,2015

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3