Paper 2017/1150
SWiM: Secure Wildcard Pattern Matching From OT Extension
Vladimir Kolesnikov, Mike Rosulek, and Ni Trieu
Abstract
Suppose a server holds a long text string and a receiver holds a short pattern string. Secure pattern matching allows the receiver to learn the locations in the long text where the pattern appears, while leaking nothing else to either party besides the length of their inputs. In this work we consider secure wildcard pattern matching WPM, where the receiver's pattern is allowed to contain wildcards that match to any character. We present SWiM, a simple and fast protocol for WPM that is heavily based on oblivious transfer (OT) extension. As such, the protocol requires only a small constant number of public-key operations and otherwise uses only very fast symmetric-key primitives. SWiM is secure against semi-honest adversaries. We implemented a prototype of our protocol to demonstrate its practicality. We can perform WPM on a DNA text (4-character alphabet) of length $10^5$ and pattern of length $10^3$ in just over 2 seconds, which is over two orders of magnitude faster than the state-of-the-art scheme of Baron et al. (SCN 2012).
Note: We updated our writeup to be clear that the previous work also considers secure pattern matching in the malicious setting. However, our paper only focuses on the semi-honest one.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Minor revision. Financial Cryptography and Data Security 2018
- Keywords
- Pattern MatchingOblivious TransferPRF
- Contact author(s)
- trieun @ oregonstate edu
- History
- 2019-03-24: revised
- 2017-11-27: received
- See all versions
- Short URL
- https://ia.cr/2017/1150
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/1150, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu}, title = {{SWiM}: Secure Wildcard Pattern Matching From {OT} Extension}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/1150}, year = {2017}, url = {https://eprint.iacr.org/2017/1150} }