2022
DOI: 10.1007/s41060-022-00320-5
|View full text |Cite
|
Sign up to set email alerts
|

Accurate and efficient privacy-preserving string matching

Abstract: The task of calculating similarities between strings held by different organisations without revealing these strings is an increasingly important problem in areas such as health informatics, national censuses, genomics, and fraud detection. Most existing privacy-preserving string matching approaches are either based on comparing sets of encoded characters allowing only exact matching of encoded strings, or they are aimed at long genomics sequences that have a small alphabet. The set-based privacy-preserving si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 51 publications
0
6
0
Order By: Relevance
“…Vaiwsri et al. [6] introduced an implementation without Bloom filters in which hashing‐based encoding is applied to the q ‐grams and longest common bit sequences to identify a match. This implementation has a semi‐trusted third‐party linkage unit to perform matches and inform the respective parties.…”
Section: Related Work On Current Pprl Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Vaiwsri et al. [6] introduced an implementation without Bloom filters in which hashing‐based encoding is applied to the q ‐grams and longest common bit sequences to identify a match. This implementation has a semi‐trusted third‐party linkage unit to perform matches and inform the respective parties.…”
Section: Related Work On Current Pprl Methodsmentioning
confidence: 99%
“…Their cryptanalysis even overcomes some of the Bloom filter hardening techniques. Usage of third parties: Implementations such as the one by Vaiwsri et al. [6] use a semi‐trusted third party to perform matches. Third parties cannot be used in the Telecom industry due to privacy laws.…”
Section: Related Work On Current Pprl Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The lack of common unique entity identifiers (such as social security numbers or patient identifiers) across the databases to be linked means that linking records is commonly based on available quasi-identifiers (QIDs), such as the names, addresses, and dates of birth of the individuals whose records are to be linked [7]. Given these are personally identifiable information [26], concerns about privacy and confidentiality limit or even prevent such personal data from being used for the linkage of records across databases [16,40].…”
Section: Introductionmentioning
confidence: 99%