Privacy-preserving edit distance computation using secret-sharing protocols
dc.rights.license | Reconocimiento 4.0 Internacional |
dc.contributor.advisor | Cabarcas Jaramillo, Daniel |
dc.contributor.author | Vanegas Madrigal, Hernán Darío |
dc.date.accessioned | 2024-01-29T21:20:45Z |
dc.date.available | 2024-01-29T21:20:45Z |
dc.date.issued | 2023 |
dc.identifier.uri | https://repositorio.unal.edu.co/handle/unal/85504 |
dc.description.abstract | La distancia de edición entre dos cadenas en un alfabeto es el mínimo número de inserciones, borrados y reemplazamientos que se necesitan para transformar una de las cadenas en la otra. Esta métrica es ampliamente utilizada en aplicaciones de la genómica para determinar la similitud de dos cadenas de ADN, lo cual tiene sus usos en estudios médicos y biológicos. A pesar de los beneficios de computar la distancia de edición entre dos cadenas de ADN, existen riesgos a la privacidad como la reidentificación, donde un adversario que posee una cadena de ADN puede extraer información privada de su propietario. Para atender estos riesgos a la privacidad, hemos propuesto un protocolo para dos participantes usando circuitos mixtos mediante esquemas de secreto compartido como Tinier y SPDZ_{2^k} para computar la distancia de edición preservando la privacidad de las cadenas usadas en el cómputo. Además, usamos daBits para realizar conversiones entre dominios, y eda\-Bits para computar comparaciones aritméticas. Nuestro trabajo se enfoca en protocolos cuyo dominio computacional subyacente son anillos de la forma Z_{2^k}. En este trabajo implementamos nuestra propuesta en el framework MP-SDPZ, y mediante una evaluación experimental simulando una red de área local, hemos encontrado que nuestra propuesta alcanza una reducción en el tiempo de ejecución de aproximadamente un 64% en el caso de seguridad activa, y un 78% en el caso de seguridad pasiva con respecto a una implementación tradicional del algoritmo Wagner-Fischer. En los experimentos mostramos que nuestro protocolo tiene una reducción de datos enviados a la red entre un 57-99% aproximadamente en comparación a una implementación usando \textit{garbled circuits}, y una reducción de 40% aproximadamente con respecto a implementaciones que usan encripción homomórfica encontradas en trabajos anteriores. (texto tomado de la fuente) |
dc.description.abstract | The edit distance between two strings in an alphabet is the minimum number of insertions, deletions, and replacements that need to be done to transform one of the strings into the other. This metric is widely used in genomic applications to determine the similarity of two DNA chains which has its uses in medical and biological studies. Despite the benefits of computing the edit distance between DNA chains, there are privacy risks like re-identification, where an adversary having a DNA chain can extract private information about its owner. To attend to such privacy concerns, we propose a two-party MPC protocol using mixed-circuit computations through secret-sharing schemes like Tinier and SPDZ_{2^k} to compute the edit distance while preserving the privacy of the DNA chains used as inputs. Also, we use daBits to perform domain conversion and edaBits to perform arithmetic comparisons. Our work focuses on protocols whose underlying computational domains are rings of the form Z_{2^k}. We implement our proposal in the MP-SPDZ framework, and through experimental evaluation simulating a local area network, we show that our proposal reaches a reduction in the execution time of approximately a 64% for active security and 78% for passive security with respect to a traditional implementation of the Wagner-Fischer algorithm. In the experiments, we show that our protocol has a reduction in the data sent of approximately 57-99% compared to a garbled circuit implementation and a reduction of the execution time of approximately 40% with respect to approaches using homomorphic encryption found in previous works. |
dc.format.extent | 122 páginas |
dc.format.mimetype | application/pdf |
dc.language.iso | eng |
dc.publisher | Universidad Nacional de Colombia |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ |
dc.subject.ddc | 510 - Matemáticas::519 - Probabilidades y matemáticas aplicadas |
dc.title | Privacy-preserving edit distance computation using secret-sharing protocols |
dc.type | Trabajo de grado - Maestría |
dc.type.driver | info:eu-repo/semantics/masterThesis |
dc.type.version | info:eu-repo/semantics/acceptedVersion |
dc.publisher.program | Medellín - Ciencias - Maestría en Ciencias - Matemática Aplicada |
dc.description.degreelevel | Maestría |
dc.description.degreename | Maestría en Ciencias - Matemáticas |
dc.description.researcharea | Criptografía |
dc.identifier.instname | Universidad Nacional de Colombia |
dc.identifier.reponame | Repositorio Institucional Universidad Nacional de Colombia |
dc.identifier.repourl | https://repositorio.unal.edu.co/ |
dc.publisher.faculty | Facultad de Ciencias |
dc.publisher.place | Medellín, Colombia |
dc.publisher.branch | Universidad Nacional de Colombia - Sede Medellín |
dc.relation.indexed | LaReferencia |
dc.relation.references | Aziz, M. M. A., Alhadidi, D., & Mohammed, N. (2017). Secure approximation of edit distance on genomic data. BMC Medical Genomics, 10(2), 41. doi:10.1186/s12920-017-0279-9 |
dc.relation.references | Aly, A., Orsini, E., Rotaru, D., Smart, N. P., & Wood, T. (2019). Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE. Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 33–44. Presented at the London, United Kingdom. doi:10.1145/3338469.3358943 |
dc.relation.references | Asharov, G., Halevi, S., Lindell, Y., & Rabin, T. (2018). Privacy-Preserving Search of Similar Patients in Genomic Data. Proceedings on Privacy Enhancing Technologies, 2018(4), 104–124. doi:10.1515/popets-2018-0034 |
dc.relation.references | Bresson, E., Catalano, D., & Pointcheval, D. (2003). A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. In C.-S. Laih (Ed.), Advances in Cryptology - ASIACRYPT 2003 (pp. 37–54). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Bellare, M., Hoang, V. T., & Rogaway, P. (2012). Foundations of Garbled Circuits. Proceedings of the 2012 ACM Conference on Computer and Communications Security, 784–796. Presented at the Raleigh, North Carolina, USA. doi:10.1145/2382196.2382279 |
dc.relation.references | Beaver, D., Micali, S., & Rogaway, P. (1990). The Round Complexity of Secure Protocols. Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, 503–513. Presented at the Baltimore, Maryland, USA. doi:10.1145/100216.100287 |
dc.relation.references | Bellare, M., & Rogaway, P. (1993). Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. Proceedings of the 1st ACM Conference on Computer and Communications Security, 62–73. Presented at the Fairfax, Virginia, USA. doi:10.1145/168588.168596 |
dc.relation.references | Berger, B., Waterman, M. S., & Yu, Y. W. (2021). Levenshtein Distance, Sequence Comparison and Biological Database Search. IEEE Transactions on Information Theory, 67(6), 3287–3294. doi:10.1109/TIT.2020.2996543 |
dc.relation.references | Cramer, R., Damgård, I. B., & Nielsen, J. B. (2015). Secure Multiparty Computation and Secret Sharing. doi:10.1017/CBO9781107337756 |
dc.relation.references | Cheon, J. H., Kim, M., & Lauter, K. (2015). Homomorphic Computation of Edit Distance. In M. Brenner, N. Christin, B. Johnson, & K. Rohloff (Eds.), Financial Cryptography and Data Security (pp. 194–212). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Cramer, R., Damgård, I., Escudero, D., Scholl, P., & Xing, C. (2018). SPDZ_2^k: Efficient MPC mod 2^k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology -- CRYPTO 2018 (pp. 769–798). Cham: Springer International Publishing. |
dc.relation.references | Damgård, I., Pastro, V., Smart, N., & Zakarias, S. (2012). Multiparty Computation from Somewhat Homomorphic Encryption. In R. Safavi-Naini & R. Canetti (Eds.), Advances in Cryptology -- CRYPTO 2012 (pp. 643–662). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Damgård, I., Escudero, D., Frederiksen, T., Keller, M., Scholl, P., & Volgushev, N. (2019). New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. 2019 IEEE Symposium on Security and Privacy (SP), 1102–1120. doi:10.1109/SP.2019.00078 |
dc.relation.references | Dalskov, A., Escudero, D., & Keller, M. (2021). Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. USENIX Security Symposium, 2183–2200. |
dc.relation.references | Demmler, D., Schneider, T., & Zohner, M. (2015). ABY - A framework for efficient mixed-protocol secure two-party computation. Network and Distributed System Security Symposium. |
dc.relation.references | Damgård, I., & Zakarias, S. (2013). Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing. In A. Sahai (Ed.), Theory of Cryptography (pp. 621–641). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Dugan, T., & Zou, X. (2016). A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests. 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 173–182. doi:10.1109/CHASE.2016.71 |
dc.relation.references | Evans, D., Kolesnikov, V., & Rosulek, M. (2018). A Pragmatic Introduction to Secure Multi-Party Computation. Foundations and Trends in Privacy and Security, 2(2–3), 70–246. doi:10.1561/3300000019 |
dc.relation.references | Erlich, Y., & Narayanan, A. (2014). Routes for breaching and protecting genetic privacy. Nature Reviews Genetics, 15(6), 409–421. doi:10.1038/nrg3723 |
dc.relation.references | Escudero, D., Ghosh, S., Keller, M., Rachuri, R., & Scholl, P. (2020). Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits. In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology -- CRYPTO 2020 (pp. 823–852). Cham: Springer International Publishing. |
dc.relation.references | Escudero, D. (2021). Multiparty Computation over Z / 2^k Z$. University of Aarhus. |
dc.relation.references | Frederiksen, T. K., Keller, M., Orsini, E., & Scholl, P. (2015). A Unified Approach to MPC with Preprocessing Using OT. In T. Iwata & J. H. Cheon (Eds.), Advances in Cryptology -- ASIACRYPT 2015 (pp. 711–735). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Gentry, C., Halevi, S., & Smart, N. P. (2012). Homomorphic Evaluation of the AES Circuit. In R. Safavi-Naini & R. Canetti (Eds.), Advances in Cryptology -- CRYPTO 2012 (pp. 850–867). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Goldreich, O., Micali, S., & Wigderson, A. (1987). How to Play ANY Mental Game. Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, 218–229. Presented at the New York, New York, USA. doi:10.1145/28395.28420 |
dc.relation.references | Halevi, S., & Shoup, V. (2020). Design and implementation of HElib: a homomorphic encryption library. Retrieved from https://eprint.iacr.org/2020/1481 |
dc.relation.references | International University in Germany, Universiteit Technische Eindhoven, & SAP AG. (2009). Secure Supply Chain Management. |
dc.relation.references | Jha, S., Kruger, L., & Shmatikov, V. (2008). Towards Practical Privacy for Genomic Computation. 2008 IEEE Symposium on Security and Privacy (Sp 2008), 216–230. doi:10.1109/SP.2008.34 |
dc.relation.references | Keller, M. (2020). MP-SPDZ: A Versatile Framework for Multi-Party Computation. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. doi:10.1145/3372297.3417872 |
dc.relation.references | Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography, Second Edition (2nd ed.). Chapman & Hall/CRC. |
dc.relation.references | Keller, M., Orsini, E., & Scholl, P. (2016). MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 830–842. Presented at the Vienna, Austria. doi:10.1145/2976749.2978357 |
dc.relation.references | Keller, M., & Yanai, A. (2018). Efficient Maliciously Secure Multiparty Computation for RAM. EUROCRYPT (3), 91–124. doi:10.1007/978-3-319-78372-7_4 |
dc.relation.references | Lindell, Y., Pinkas, B., Smart, N. P., & Yanai, A. (2019). Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ. Journal of Cryptology, 32(3), 1026–1069. doi:10.1007/s00145-019-09322-2 |
dc.relation.references | Larraia, E., Orsini, E., & Smart, N. P. (2014). Dishonest Majority Multi-Party Computation for Binary Circuits. In J. A. Garay & R. Gennaro (Eds.), Advances in Cryptology -- CRYPTO 2014 (pp. 495–512). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Nielsen, J. B., Nordholt, P. S., Orlandi, C., & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. In R. Safavi-Naini & R. Canetti (Eds.), Advances in Cryptology -- CRYPTO 2012 (pp. 681–700). Berlin, Heidelberg: Springer Berlin Heidelberg. |
dc.relation.references | Nielsen, J. B. (2007). Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free. Retrieved from https://eprint.iacr.org/2007/215 |
dc.relation.references | Oestreich, M., Chen, D., Schultze, J. L., Fritz, M., & Becker, M. (2021). Privacy considerations for sharing genomics data. EXCLI Journal, 1243–1260. doi:10.17179/EXCLI2021-4002 |
dc.relation.references | Ohata, S. (2020). Recent Advances in Practical Secure Multi-Party Computation. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E103A, 1134–1141. |
dc.relation.references | Rane, S., & Sun, W. (2010). Privacy preserving string comparisons based on Levenshtein distance. 2010 IEEE International Workshop on Information Forensics and Security, 1–6. doi:10.1109/WIFS.2010.5711449 |
dc.relation.references | Rotaru, D., & Wood, T. (2019). MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security. In F. Hao, S. Ruj, & S. Sen Gupta (Eds.), Progress in Cryptology -- INDOCRYPT 2019 (pp. 227–249). Cham: Springer International Publishing. |
dc.relation.references | Schneider, T., & Tkachenko, O. (2019). EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 315–327. Presented at the Auckland, New Zealand. doi:10.1145/3321705.3329800 |
dc.relation.references | Smith, T. F., & Waterman, M. S. (1981). Identification of common molecular subsequences. Journal of Molecular Biology, 147(1), 195–197. doi:10.1016/0022-2836(81)90087-5 |
dc.relation.references | Ukkonen, E. (1985). Algorithms for approximate string matching. Information and Control, 64(1), 100–118. doi:10.1016/S0019-9958(85)80046-2 |
dc.relation.references | Vanegas, H., Cabarcas, D., & Aranha, D. F. (2023). Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation. In A. Aly & M. Tibouchi (Eds.), Progress in Cryptology -- LATINCRYPT 2023 (pp. 67–86). Cham: Springer Nature Switzerland. |
dc.relation.references | West, D. B. (2020). Combinatorial mathematics. Cambridge University Press. |
dc.relation.references | Yao, A. C. (1982). Protocols for secure computations. 23rd Annual Symposium on Foundations of Computer Science (Sfcs 1982), 160–164. doi:10.1109/SFCS.1982.38 |
dc.relation.references | Toft, T. (2007). Primitives and Applications for Multi-party Computation. University of Aarhus. |
dc.relation.references | Wagner, R. A., & Fischer, M. J. (1974). The String-to-String Correction Problem. J. ACM, 21(1), 168–173. doi:10.1145/321796.321811 |
dc.relation.references | Yao, A. C. (1986). How to generate and exchange secrets. 27th Annual Symposium on Foundations of Computer Science (Sfcs 1986), 162–167. doi:10.1109/SFCS.1986.25 |
dc.relation.references | Zhu, R., & Huang, Y. (2022). Efficient and Precise Secure Generalized Edit Distance and Beyond. IEEE Transactions on Dependable and Secure Computing, 19(1), 579–590. doi:10.1109/TDSC.2020.2984219 |
dc.relation.references | Zhao, C., Zhao, S., Zhao, M., Chen, Z., Gao, C.-Z., Li, H., & Tan, Y.-A. (2019). Secure Multi-Party Computation: Theory, practice and applications. Information Sciences, 476, 357–372. doi:10.1016/j.ins.2018.10.024 |
dc.relation.references | Zheng, Y., Lu, R., Shao, J., Zhang, Y., & Zhu, H. (2019). Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data. 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), 1–6. doi:10.1109/WCSP.2019.8927885 |
dc.rights.accessrights | info:eu-repo/semantics/openAccess |
dc.subject.proposal | Secure multi-party computation |
dc.subject.proposal | Edit distance |
dc.subject.proposal | Secret-sharing |
dc.subject.proposal | Computación segura de múltiples participantes |
dc.subject.proposal | Distancia de edición |
dc.subject.proposal | Secreto compartido |
dc.title.translated | Cómputo de la distancia de edición preservando la privacidad usando protocolos basados en secreto compartido |
dc.type.coar | http://purl.org/coar/resource_type/c_bdcc |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa |
dc.type.content | Text |
dc.type.redcol | http://purl.org/redcol/resource_type/TM |
oaire.accessrights | http://purl.org/coar/access_right/c_abf2 |
dcterms.audience.professionaldevelopment | Estudiantes |
dcterms.audience.professionaldevelopment | Investigadores |
dcterms.audience.professionaldevelopment | Maestros |
dcterms.audience.professionaldevelopment | Público general |
dc.description.curriculararea | Área Curricular en Matemáticas |
dc.contributor.orcid | 0000-0002-5662-9663 |
dc.subject.wikidata | Secreto compartido |
Files in this item
This item appears in the following Collection(s)
This work is licensed under a Creative Commons Reconocimiento-NoComercial 4.0.This document has been deposited by the author (s) under the following certificate of deposit