Cryptology ePrint Archive: Report 2016/908

Secure Error-Tolerant Graph Matching Protocols

Kalikinkar Mandal and Basel Alomair and Radha Poovendran

Abstract: We consider a setting where there are two parties, each party holds a private graph and they wish to jointly compute the structural dissimilarity between two graphs without revealing any information about their private input graph. Graph edit distance (GED) is a widely accepted metric for measuring the dissimilarity of graphs. It measures the minimum cost for transforming one graph into the other graph by applying graph edit operations. In this paper we present a framework for securely computing approximated GED and as an example, present a protocol based on threshold additive homomorphic encryption scheme. We develop several new sub-protocols such as private maximum computation and optimal assignment protocols to construct the main protocol. We show that our protocols are secure against semi-honest adversaries. The asymptotic complexity of the protocol is $O(n^5\ell\log^*(\ell))$ where $\ell$ is the bit length of ring elements and $n$ is the number of nodes in the graph.

Category / Keywords: cryptographic protocols / Secure two-partycomputation, Graph edit distance, Privacy, Graph algorithms

Original Publication (with minor differences): CANS-2016

Date: received 17 Sep 2016, last revised 19 Sep 2016

Contact author: kmandal at uwaterloo ca

Available format(s): PDF | BibTeX Citation

Version: 20160919:130627 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]