Privacy-preserving Hamming and Edit Distance Computation and Applications

With the rapid development of information technology,privacy-preserving multiparty cooperative computation is becoming more and more popular.Secure multiparty computation is a key technology to address such problems.In scientific research and practical applications,people measure the similarity of t...

Full description

Bibliographic Details
Main Author: DOU Jia-wei
Format: Article
Language:zho
Published: Editorial office of Computer Science 2022-09-01
Series:Jisuanji kexue
Subjects:
Online Access:https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-49-9-355.pdf
_version_ 1797845133216972800
author DOU Jia-wei
author_facet DOU Jia-wei
author_sort DOU Jia-wei
collection DOAJ
description With the rapid development of information technology,privacy-preserving multiparty cooperative computation is becoming more and more popular.Secure multiparty computation is a key technology to address such problems.In scientific research and practical applications,people measure the similarity of two strings with Hamming(edit) distance.It is of great significance to study privacy-preserving Hamming(edit) distance computation.This paper studies privacy-preserving Hamming(edit) distance computation.First,we transform Hamming distance computation to inner product computation of vectors,and then use Okamoto-Uchiyama(OU) cryptosystem and encryption-and-choose technique to design protocol for Hamming distance.Second,we give each alphabet of a string a number,transform edit distance to determine whether the difference of the number of two alphabets is 0,and use OU cryptosystem to design a privacy-preserving edit distance computation protocol.The security of the protocol is strictly proved,the computational complexity of the protocol is analyzed,the actual implementation efficiency of the protocol is tested and compared with the existing results.Theoretical analysis and experimental results show that our protocols are efficient.
first_indexed 2024-04-09T17:33:39Z
format Article
id doaj.art-6f3f8f0e0fef4062af0555d49567e212
institution Directory Open Access Journal
issn 1002-137X
language zho
last_indexed 2024-04-09T17:33:39Z
publishDate 2022-09-01
publisher Editorial office of Computer Science
record_format Article
series Jisuanji kexue
spelling doaj.art-6f3f8f0e0fef4062af0555d49567e2122023-04-18T02:32:32ZzhoEditorial office of Computer ScienceJisuanji kexue1002-137X2022-09-0149935536010.11896/jsjkx.220100241Privacy-preserving Hamming and Edit Distance Computation and ApplicationsDOU Jia-wei0School of Mathematics and Statistics,Shaanxi Normal University,Xi'an 710119,ChinaWith the rapid development of information technology,privacy-preserving multiparty cooperative computation is becoming more and more popular.Secure multiparty computation is a key technology to address such problems.In scientific research and practical applications,people measure the similarity of two strings with Hamming(edit) distance.It is of great significance to study privacy-preserving Hamming(edit) distance computation.This paper studies privacy-preserving Hamming(edit) distance computation.First,we transform Hamming distance computation to inner product computation of vectors,and then use Okamoto-Uchiyama(OU) cryptosystem and encryption-and-choose technique to design protocol for Hamming distance.Second,we give each alphabet of a string a number,transform edit distance to determine whether the difference of the number of two alphabets is 0,and use OU cryptosystem to design a privacy-preserving edit distance computation protocol.The security of the protocol is strictly proved,the computational complexity of the protocol is analyzed,the actual implementation efficiency of the protocol is tested and compared with the existing results.Theoretical analysis and experimental results show that our protocols are efficient.https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-49-9-355.pdfsmc|hamming distance|edit distance|semi-honest model|simulation paradigm
spellingShingle DOU Jia-wei
Privacy-preserving Hamming and Edit Distance Computation and Applications
Jisuanji kexue
smc|hamming distance|edit distance|semi-honest model|simulation paradigm
title Privacy-preserving Hamming and Edit Distance Computation and Applications
title_full Privacy-preserving Hamming and Edit Distance Computation and Applications
title_fullStr Privacy-preserving Hamming and Edit Distance Computation and Applications
title_full_unstemmed Privacy-preserving Hamming and Edit Distance Computation and Applications
title_short Privacy-preserving Hamming and Edit Distance Computation and Applications
title_sort privacy preserving hamming and edit distance computation and applications
topic smc|hamming distance|edit distance|semi-honest model|simulation paradigm
url https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-49-9-355.pdf
work_keys_str_mv AT doujiawei privacypreservinghammingandeditdistancecomputationandapplications