skip to main content
10.1145/3412841.3442079acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

A two-party private string matching fuzzy vault scheme

Published:22 April 2021Publication History

ABSTRACT

A Fuzzy Vault is a cryptographic structure where a secret is being locked by a key and can be unlocked only by another key with significant overlap. In this paper, we introduce a two-party privacy-preserving approximate string matching methodology based on a novel Fuzzy Vault scheme, combining the approximation and security properties of Fuzzy Vaults for privacy-preserving record linkage purposes.

References

  1. Luca Bonomi, Yingxiang Huang, and Lucila Ohno-Machado. 2020. Privacy challenges and research opportunities for genomic data sharing. Nature Genetics (2020), 1--9.Google ScholarGoogle Scholar
  2. Feng Chen, Xiaoqian Jiang, Shuang Wang, Lisa M Schilling, Daniella Meeker, Toan Ong, Michael E Matheny, Jason N Doctor, Lucila Ohno-Machado, and Jaideep Vaidya. 2018. Perfectly secure and efficient two-party electronic-health-record linkage. IEEE internet computing 22, 2 (2018), 32--41.Google ScholarGoogle ScholarCross RefCross Ref
  3. Yanling Chen. 2020. Current approaches and challenges for the two-party privacy-preserving record linkage (PPRL). In Collaborative Technologies and Data Science in Artificial Intelligence Applications. 108--116.Google ScholarGoogle Scholar
  4. T Charles Clancy, Negar Kiyavash, and Dennis J Lin. 2003. Secure smartcardbased fingerprint authentication. In Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications. 45--52.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Samuel Daniel Conte and Carl De Boor. 2017. Elementary numerical analysis: an algorithmic approach. SIAM. 31--41 pages.Google ScholarGoogle Scholar
  6. Fred J Damerau. 1964. A technique for computer detection and correction of spelling errors. Commun. ACM 7, 3 (1964), 171--176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Aleksander Essex. 2019. Secure Approximate String Matching for Privacy-Preserving Record Linkage. IEEE Transactions on Information Forensics and Security 14, 10 (2019), 2623--2632.Google ScholarGoogle ScholarCross RefCross Ref
  8. Michael T Goodrich. 2009. The mastermind attack on genomic data. In 2009 30th IEEE Symposium on Security and Privacy. IEEE, 204--218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Basit Khurram and Florian Kerschbaum. 2020. SFour: A Protocol for Cryptographically Secure Record Linkage at Scale. In 2020 IEEE 36th International Conference on Data Engineering (ICDE). IEEE, 277--288.Google ScholarGoogle ScholarCross RefCross Ref
  11. Vladimir Levenshtein. 1965. Binary codes capable of correcting spurious insertions and deletion of ones. Problems of information Transmission 1, 1 (1965), 8--17.Google ScholarGoogle Scholar
  12. Chaoyi Pang, Lifang Gu, David Hansen, and Anthony Maeder. 2009. Privacy-preserving fuzzy matching using a public reference table. In Intelligent Patient Management. Springer, 71--89.Google ScholarGoogle Scholar
  13. Wendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Judith Liu-Jimenez, and Raul Sanchez-Reillo. 2020. Fuzzy Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification. IEEE Access 8 (2020), 11152--11164.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ahsan Saleem, Abid Khan, Furqan Shahid, M Masoom Alam, and Muhammad Khurram Khan. 2018. Recent advancements in garbled computing: how far have we come towards achieving secure, efficient and reusable garbled circuits. Journal of Network and Computer Applications 108 (2018), 1--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Walter J Scheirer and Terrance E Boult. 2007. Cracking fuzzy vaults and biometric encryption. In 2007 Biometrics Symposium. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  16. Umut Uludag, Sharath Pankanti, and Anil K Jain. 2005. Fuzzy vault for fingerprints. In International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, 310--319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Dinusha Vatsalan, Ziad Sehili, Peter Christen, and Erhard Rahm. 2017. Privacy-preserving record linkage for big data: Current approaches and research challenges. In Handbook of Big Data Technologies. Springer, 851--895.Google ScholarGoogle Scholar
  1. A two-party private string matching fuzzy vault scheme

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing
      March 2021
      2075 pages
      ISBN:9781450381048
      DOI:10.1145/3412841

      Copyright © 2021 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 April 2021

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader