Secure Hashing-Based Verifiable Pattern Matching

Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen*, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang, Jing Qin

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

9 引用 (Scopus)
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 9
  • Captures
    • Readers: 16
see details

摘要

Verifiable pattern matching is the problem of finding a given pattern verifiably from the outsourced textual data, which is resident in an untrusted remote server. This problem has drawn much attention due to a large number of applications. The state-of-the-art method for this problem suffers from low efficiency. To enable fast verifiable pattern matching, we propose a novel scheme in this paper. Our scheme is based on an ordered set accumulator data structure and a newly developed verifiable suffix array structure, which only involves fast cryptographic hash computations. Our scheme also supports fast multiple-occurrence pattern matching. A striking feature of our proposed scheme is that our scheme works even with no secret keys, which ensures public verifiability. We conduct extensive experiments to evaluate the proposed scheme using Java. The results show that our scheme is orders of magnitude faster than the state-of-the-art work. Specifically, our scheme with public verifiability only costs a preprocessing time of 47 s (merely one-time off-line cost during outsourcing), a search time of 30μ s , a verification time of 149∼mu s , and a proof size of 2760 bytes for a verifiable pattern matching query with pattern length 200 on 10-million long textual data which consists of sequences of two-byte, Unicode characters in Java.

源语言英语
页(从-至)2677-2690
页数14
期刊IEEE Transactions on Information Forensics and Security
13
11
DOI
出版状态已出版 - 11月 2018

指纹

探究 'Secure Hashing-Based Verifiable Pattern Matching' 的科研主题。它们共同构成独一无二的指纹。

引用此

Chen, F., Wang, D., Li, R., Chen, J., Ming, Z., Liu, A. X., Duan, H., Wang, C., & Qin, J. (2018). Secure Hashing-Based Verifiable Pattern Matching. IEEE Transactions on Information Forensics and Security, 13(11), 2677-2690. https://doi.org/10.1109/TIFS.2018.2825141