Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1005140.1005147acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Secure and private sequence comparisons

Published: 30 October 2003 Publication History
  • Get Citation Alerts
  • Abstract

    We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other than what can be inferred from the edit distance between their two sequences - which is unavoidable because computing that distance is the purpose of the protocol). The amount of communication done by our protocol is proportional to the time complexity of the best-known algorithm for performing the sequence comparison.The problem of determining the similarity between two sequences arises in a large number of applications, in particular in bioinformatics. In these application areas, the edit distance is one of the most widely used notions of sequence similarity: It is the least-cost set of insertions, deletions, and substitutions required to transform one string into the other. The generalizations of edit distance that are solved by the same kind of dynamic programming recurrence relation as the one for edit distance, cover an even wider domain of applications.

    References

    [1]
    A. V. Aho, D. S. Hirschberg and J. D. Ullman. Bounds on the Complexity of the Longest Common Subsequence Problem, Journal of the ACM 23, 1, pp. 1--12 (1976).
    [2]
    J. Benaloh. Dense Probabilistic Encryption, Proceedings of the Workshop on Selected Areas of Cryptography, pp. 120--128 (1994).
    [3]
    C. Cachin. Efficient Private Bidding and Auctions with an Oblivious Third Party. Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 120--127 (1999).
    [4]
    W. Du and M. J. Atallah. Protocols for Secure Remote Database Access with Approximate Matching. Proceedings of the 1st ACM Workshop on Security and Privacy in E-Commerce (2000).
    [5]
    M. Fischlin. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. RSA Security 2001 Cryptographer's Track. Lecture Notes in Computer Science 2020, pp. 457--471 (2001).
    [6]
    O. Goldreich. Secure Multi-party Computation (working draft). Available at http://www.wisdom.weizmann.ac.il/~oded/pp.html (2001).
    [7]
    S. Goldwasser and S. Micali. Probabilistic Encryption. Journal of Computer and System Sciences 28, 2, pp. 270--299 (1984).
    [8]
    G. Landau and U. Vishkin. Introducing Efficient Parallelism into Approximate String Matching and a new Serial Algorithm, Proceedings of the 18-th ACM STOC, pp. 220--230 (1986).
    [9]
    H. M. Martinez (ed.) Mathematical and Computational Problems in the Analysis of Molecular Sequences, Bulletin of Mathematical Biology (Special Issue Honoring M. O. Dayhoff), 46, 4 (1984).
    [10]
    W. J. Masek and M. S. Paterson. A Faster Algorithm Computing String Edit Distances, Journal of Computer and System Science 20, pp. 18--31 (1980).
    [11]
    D. Naccache and J. Stern. A New Cryptosystem based on Higher Residues. Proceedings of the ACM Conference on Computer and Communications Security 5, pp. 59--66 (1998).
    [12]
    S. B. Needleman and C. D. Wunsch. A General Method Applicable to the Search for Similarities in the Amino-acid Sequence of Two Proteins, Journal of Molecular Biology 48, pp. 443--453 (1973).
    [13]
    T. Okamoto and S. Uchiyama. A New Public-Key Cryptosystem as Secure as Factoring. Eurocrypt'98 Lecture Notes in Computer Science 1403, pp. 308--318 (1998).
    [14]
    D. Sankoff. Matching Sequences Under Deletion-insertion Constraints, Proceedings of the National Academy of Sciences of the U.S.A. 69, pp. 4--6 (1972).
    [15]
    D. Sankoff and J. B. Kruskal (eds.). Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison, Addison-Wesley, Reading, PA (1983).
    [16]
    Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C (Second Edition), John Wiley & Sons, New York, NY (1996).
    [17]
    P. H. Sellers. An Algorithm for the Distance between two Finite Sequences, J. of Combinatorial Theory 16, pp. 253--258 (1974).
    [18]
    P. H. Sellers. The Theory and Computation of Evolutionary Distance: Pattern Recognition, Journal of Algorithms 1, pp. 359--373 (1980).
    [19]
    E. Ukkonen. Finding Approximate Patterns in Strings, Journal of Algorithms 6, pp. 132--137 (1985).
    [20]
    R. A. Wagner and M. J. Fischer. The String to String Correction Problem, Journal of the ACM 21, 1, pp. 168--173 (1974).
    [21]
    C. K. Wong and A. K. Chandra. Bounds for the String Editing Problem, Journal of the ACM 23, 1, pp. 13--16 (1976).
    [22]
    A. Yao. Protocols for Secure Computations. Proceedings of the Annual IEEE Symposium on Foundations of Computer Science 23, pp. 160--164 (1982).

    Cited By

    View all
    • (2024)Privacy-preserving Scanpath Comparison for Pervasive Eye TrackingProceedings of the ACM on Human-Computer Interaction10.1145/36556058:ETRA(1-28)Online publication date: 28-May-2024
    • (2024)Threat-Specific Security Risk Evaluation in the Cloud2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)10.1109/ACCAI61061.2024.10602321(1-10)Online publication date: 9-May-2024
    • (2023)Balancing Security and Privacy in Genomic Range QueriesACM Transactions on Privacy and Security10.1145/357579626:3(1-28)Online publication date: 13-Mar-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
    October 2003
    135 pages
    ISBN:1581137761
    DOI:10.1145/1005140
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 October 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. dynamic programming
    2. edit distance
    3. longest common subsequence
    4. privacy
    5. secure multi-party computation
    6. string matching

    Qualifiers

    • Article

    Conference

    CCS03
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 106 of 355 submissions, 30%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Privacy-preserving Scanpath Comparison for Pervasive Eye TrackingProceedings of the ACM on Human-Computer Interaction10.1145/36556058:ETRA(1-28)Online publication date: 28-May-2024
    • (2024)Threat-Specific Security Risk Evaluation in the Cloud2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)10.1109/ACCAI61061.2024.10602321(1-10)Online publication date: 9-May-2024
    • (2023)Balancing Security and Privacy in Genomic Range QueriesACM Transactions on Privacy and Security10.1145/357579626:3(1-28)Online publication date: 13-Mar-2023
    • (2023)Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing AttacksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.318667220:4(3341-3357)Online publication date: 1-Jul-2023
    • (2023)Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid CloudsIEEE Transactions on Cloud Computing10.1109/TCC.2021.309235811:1(308-323)Online publication date: 1-Jan-2023
    • (2023)Genomic privacy: performance analysis, open issues, and future research directionsData Science for Genomics10.1016/B978-0-323-98352-5.00015-X(249-263)Online publication date: 2023
    • (2022)An Effective Dynamic Propagation Model for Malware Detection in Cloud Platform2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)10.1109/ICACCS54159.2022.9785248(1268-1272)Online publication date: 25-Mar-2022
    • (2022)An efficient algorithm for the longest common palindromic subsequence problemTheoretical Computer Science10.1016/j.tcs.2022.04.046922(475-485)Online publication date: Jun-2022
    • (2022)Accurate privacy-preserving record linkage for databases with missing valuesInformation Systems10.1016/j.is.2021.101959106:COnline publication date: 1-May-2022
    • (2022)Intrusion (Hybrid) Detection System for Cloud Computing EnvironmentsAdvances in Data Science and Management10.1007/978-981-16-5685-9_45(463-471)Online publication date: 13-Feb-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media