We consider the fuzzy private matching problem, in a semi-honest environment. Elements are similar if they match on $t$ out of $T$ attributes. First we show that the original solution proposed by Freedman et al. is incorrect. Subsequently we present two fuzzy private matching protocols. The first, simple, protocol has bit message complexity $O(n \binom{T}{t} (T \log{|D|}+k))$. The second, improved, protocol has a much better bit message complexity of $O(n T (\log{|D|}+k))$, but here the client incurs a $O(n)$ factor time complexity. Additionally, we present protocols based on the computation of the Hamming distance and on oblivious transfer, that have different, sometimes more efficient, performance characteristics.
Category / Keywords: cryptographic protocols / fuzzy matching, secure 2-party computation, secret sharing Date: received 12 Sep 2007, last revised 26 Oct 2007 Contact author: lukaszc at cs ru nl Available format(s): PDF | BibTeX Citation Version: 20071026:150213 (All versions of this report) Short URL: ia.cr/2007/363 Discussion forum: Show discussion | Start new discussion