Edit distance based encryption and its application
Edit distance, also known as Levenshtein distance, is a very useful tool to measure the similarity between two strings. It has been widely used in many applications such as natural language processing and bioinformatics. In this paper, we introduce a new type of fuzzy public key encryption called Ed...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7397 https://ink.library.smu.edu.sg/context/sis_research/article/8400/viewcontent/Edit_Distance_Based_Encryption_and_Its_Application.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8400 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84002022-10-13T07:17:58Z Edit distance based encryption and its application PHUONG, Tran Viet Xuan YANG, Guomin SUSILO, Willy LIANG, Kaitai Edit distance, also known as Levenshtein distance, is a very useful tool to measure the similarity between two strings. It has been widely used in many applications such as natural language processing and bioinformatics. In this paper, we introduce a new type of fuzzy public key encryption called Edit Distance-based Encryption (EDE). In EDE, the encryptor can specify an alphabet string and a threshold when encrypting a message, and a decryptor can obtain a decryption key generated from another alphabet string, and the decryption will be successful if and only if the edit distance between the two strings is within the pre-defined threshold. We provide a formal definition and security model for EDE, and propose an EDE scheme that can securely evaluate the edit distance between two strings embedded in the ciphertext and the secret key. We also show an interesting application of our EDE scheme named Fuzzy Broadcast Encryption which is very useful in a broadcasting network. 2016-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7397 info:doi/10.1007/978-3-319-40367-0_7 https://ink.library.smu.edu.sg/context/sis_research/article/8400/viewcontent/Edit_Distance_Based_Encryption_and_Its_Application.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Edit distance Fuzzy encryption Dynamic programming Viète’s Formulas Information Security OS and Networks |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Edit distance Fuzzy encryption Dynamic programming Viète’s Formulas Information Security OS and Networks |
spellingShingle |
Edit distance Fuzzy encryption Dynamic programming Viète’s Formulas Information Security OS and Networks PHUONG, Tran Viet Xuan YANG, Guomin SUSILO, Willy LIANG, Kaitai Edit distance based encryption and its application |
description |
Edit distance, also known as Levenshtein distance, is a very useful tool to measure the similarity between two strings. It has been widely used in many applications such as natural language processing and bioinformatics. In this paper, we introduce a new type of fuzzy public key encryption called Edit Distance-based Encryption (EDE). In EDE, the encryptor can specify an alphabet string and a threshold when encrypting a message, and a decryptor can obtain a decryption key generated from another alphabet string, and the decryption will be successful if and only if the edit distance between the two strings is within the pre-defined threshold. We provide a formal definition and security model for EDE, and propose an EDE scheme that can securely evaluate the edit distance between two strings embedded in the ciphertext and the secret key. We also show an interesting application of our EDE scheme named Fuzzy Broadcast Encryption which is very useful in a broadcasting network. |
format |
text |
author |
PHUONG, Tran Viet Xuan YANG, Guomin SUSILO, Willy LIANG, Kaitai |
author_facet |
PHUONG, Tran Viet Xuan YANG, Guomin SUSILO, Willy LIANG, Kaitai |
author_sort |
PHUONG, Tran Viet Xuan |
title |
Edit distance based encryption and its application |
title_short |
Edit distance based encryption and its application |
title_full |
Edit distance based encryption and its application |
title_fullStr |
Edit distance based encryption and its application |
title_full_unstemmed |
Edit distance based encryption and its application |
title_sort |
edit distance based encryption and its application |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/7397 https://ink.library.smu.edu.sg/context/sis_research/article/8400/viewcontent/Edit_Distance_Based_Encryption_and_Its_Application.pdf |
_version_ |
1770576331312988160 |