Skip to main content

Efficient Privacy-Preserving Binary Tree Search

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2020)

Abstract

Binary search tree is a common structure in computer programming and is currently widely used in many scenarios, such as routing search engine in routers, massive data concurrent query, set/multiset, map in C++ STL, and Linux Such technology is applied to memory management and the like. However, with the development of network technology, people’s demand for privacy protection has gradually increased. The leakage of many key information will cause serious consequences, and also restrict the application and development of network technology. In the process of binary tree search, it is easy to have such a problem: the searched party may only want to provide the location of the searched data without exposing all the data in the entire binary search tree; at the same time, the searcher does not want to expose itself The information you need to find. This leads to issues related to the privacy protection of binary search trees. In response to the above problems, we have proposed a binary tree search solution that can protect privacy, which is used to solve the data leakage problem that may exist during the search process of the binary tree. The feature of the scheme proposed in the text is that it integrates two technologies of binary search tree and obfuscation circuit, so as to effectively protect the binary search tree and perform the search without leaking data. And the security analysis shows that the protocol we proposed is very safe and efficient, which can protect the data beneficially.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adelson-velskii, G.M., Landis, E.Nl.: Doklady akademia nauk sssr (1962)

    Google Scholar 

  2. Chang, S.K.: Parallel balancing of binary search trees. IEEE Trans. Comput. 23, 441–445 (1974)

    Article  Google Scholar 

  3. Haq, E., Cheng, Y., Iyengar, S.S.: New algorithms for balancing binary search trees. In: IEEE Conference Proceedings, pp. 378–382 (1988)

    Google Scholar 

  4. Bayer, R.: Symmetric binary B-trees: data structure and maintenance algorithms. Acfa Inf. 1(4), 290–306 (1972)

    MathSciNet  MATH  Google Scholar 

  5. Guibas, L.J., Sedgewick, R.: A dichromatic framework for balanced trees. In: Proceedings of the 19th Symposium on the Foundations of Computer Science (1978)

    Google Scholar 

  6. Borovskiy, V., Müller, J., Schapranow, M.P., Zeier, A.: Binary search tree visualization algorithm. IEEE (2009)

    Google Scholar 

  7. Ramachandran, R.: Kakkot Tree — A Binary Search Tree with caching. IEEE (2012)

    Google Scholar 

  8. Chinnaiyan, R., Kumar, A.: Construction of estimated level based balanced binary search tree. In: ICECA (2017)

    Google Scholar 

  9. Shekhar, A., Goyal, J.: Parallel binary search trees for rapid IP lookup using graphic processors. In: Proceedings of IMKE, pp. 176–179 (2013)

    Google Scholar 

  10. Rabin, M.O.: How to exchange secrets by oblivious transfer, Aiken Computation Lab, University Harvard, USA, Technical Report TR-81 (1981)

    Google Scholar 

  11. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28, 637–647 (1985)

    Article  MathSciNet  Google Scholar 

  12. Yao, A.: Protocols for secure computation. In: Proceedings 23rd Annual Symposium on Foundations of Computer Science (FOCS), pp. 160–164 (1982)

    Google Scholar 

  13. Kolesnikov, V., Sadeghi, A., Schneider, T.T.: Improved garbled circuit building blocks and applications to auctions and computing minima. Crypt. Network Secur. (2009)

    Google Scholar 

  14. Goldreich, O., Micali, S., Wigderson, A.: How to Solve any Protocol Problem. In: Proceedings of STOC (1987)

    Google Scholar 

  15. Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643–662. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_38

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maohua Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, R., Sun, M. (2020). Efficient Privacy-Preserving Binary Tree Search. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62223-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62222-0

  • Online ISBN: 978-3-030-62223-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics