Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society 2003
DOI: 10.1145/1005140.1005147
|View full text |Cite
|
Sign up to set email alerts
|

Secure and private sequence comparisons

Abstract: We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other than what can be inferred from the edit distance between their two sequences -which is unavoidable because computing that distance is the purpose of the protocol). The amount of communication done by our protocol is proportional to the time complexity of the best-known algorithm for performing the sequence comparison.The problem of det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
106
0
2

Year Published

2005
2005
2015
2015

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 152 publications
(108 citation statements)
references
References 17 publications
0
106
0
2
Order By: Relevance
“…Since this is the core of a PPRL problem, there are suggestions for SMC protocols in PPRL. For example Atallah et al (2003) proposed a SMC protocol for the computation of edit distances, the number of edit operations such as inserting, deleting, substituting characters to transform one string into another string. Another SMC protocol for the computation of other string distances has been suggested by Ravikumar et al (2004).…”
Section: Secure Multiparty Computations For Pprlmentioning
confidence: 99%
“…Since this is the core of a PPRL problem, there are suggestions for SMC protocols in PPRL. For example Atallah et al (2003) proposed a SMC protocol for the computation of edit distances, the number of edit operations such as inserting, deleting, substituting characters to transform one string into another string. Another SMC protocol for the computation of other string distances has been suggested by Ravikumar et al (2004).…”
Section: Secure Multiparty Computations For Pprlmentioning
confidence: 99%
“…-We can no longer afford to have the customer carry out quadratic work or communication: Whereas in [2] there was "balance" in that all participants had equal computational and communication power, in our case the participant to whom all of the data and answer belong is asymmetrically weaker and is limited to a linear amount of computation and communication (hence cannot directly participate or help in each step of the quadratic-complexity dynamic programming solution).…”
Section: Related Workmentioning
confidence: 95%
“…Recently, Atallah, Kerschbaum, and Du [2] developed an efficient protocol for sequence comparisons in the secure two-party computation framework in which each party has a private string; the protocol enables two parties to compute the edit distance of two sequences such that neither party learns anything about the private sequence of the other party. They [2] use dynamic programming to compare sequences, but in an additively split way -each party maintains a matrix, the summation of two matrices is the real matrix implicitly used to compute edit distance.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations