DocumentCode :
1736276
Title :
Privacy-preserving path-inclusion protocol through oblivious automata
Author :
Huang, Meishan ; Lin, Bogang ; Yang, Yang
Author_Institution :
Coll. of Math. & Comput. Sci., Fuzhou Univ., Fuzhou, China
fYear :
2012
Firstpage :
128
Lastpage :
132
Abstract :
This paper focuses on path-inclusion secure two-party computation problem, and an efficient protocol for securely computing the path-inclusion problem is proposed. This problem is defined in the two parties setting, where Alice and Bob both have a path. The goal of Bob is to learn whether his path is included by the path Alice holds, without revealing it to Alice or learning anything else about Alice´s path. Our construction is based on an automata evaluation sub-protocol. In our protocol, each path is coded into a string which reserves all information about the original path. Then both parties are involved in the automata evaluation sub-protocol. Finally one of them can learn whether one path includes the other one.
Keywords :
automata theory; protocols; security of data; oblivious automata evaluation subprotocol; privacy-preserving path-inclusion protocol; secure communication; two-party computation problem; Automata; Complexity theory; Encryption; Protocols; Vectors; Path-inclusion; String matching; automata evaluation; secure multi-party computation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Control, Automatic Detection and High-End Equipment (ICADE), 2012 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4673-1331-5
Type :
conf
DOI :
10.1109/ICADE.2012.6330113
Filename :
6330113
Link To Document :
بازگشت