Abstract
Binary search tree is a common structure in computer programming and is currently widely used in many scenarios, such as routing search engine in routers, massive data concurrent query, set/multiset, map in C++ STL, and Linux Such technology is applied to memory management and the like. However, with the development of network technology, people’s demand for privacy protection has gradually increased. The leakage of many key information will cause serious consequences, and also restrict the application and development of network technology. In the process of binary tree search, it is easy to have such a problem: the searched party may only want to provide the location of the searched data without exposing all the data in the entire binary search tree; at the same time, the searcher does not want to expose itself The information you need to find. This leads to issues related to the privacy protection of binary search trees. In response to the above problems, we have proposed a binary tree search solution that can protect privacy, which is used to solve the data leakage problem that may exist during the search process of the binary tree. The feature of the scheme proposed in the text is that it integrates two technologies of binary search tree and obfuscation circuit, so as to effectively protect the binary search tree and perform the search without leaking data. And the security analysis shows that the protocol we proposed is very safe and efficient, which can protect the data beneficially.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adelson-velskii, G.M., Landis, E.Nl.: Doklady akademia nauk sssr (1962)
Chang, S.K.: Parallel balancing of binary search trees. IEEE Trans. Comput. 23, 441–445 (1974)
Haq, E., Cheng, Y., Iyengar, S.S.: New algorithms for balancing binary search trees. In: IEEE Conference Proceedings, pp. 378–382 (1988)
Bayer, R.: Symmetric binary B-trees: data structure and maintenance algorithms. Acfa Inf. 1(4), 290–306 (1972)
Guibas, L.J., Sedgewick, R.: A dichromatic framework for balanced trees. In: Proceedings of the 19th Symposium on the Foundations of Computer Science (1978)
Borovskiy, V., Müller, J., Schapranow, M.P., Zeier, A.: Binary search tree visualization algorithm. IEEE (2009)
Ramachandran, R.: Kakkot Tree — A Binary Search Tree with caching. IEEE (2012)
Chinnaiyan, R., Kumar, A.: Construction of estimated level based balanced binary search tree. In: ICECA (2017)
Shekhar, A., Goyal, J.: Parallel binary search trees for rapid IP lookup using graphic processors. In: Proceedings of IMKE, pp. 176–179 (2013)
Rabin, M.O.: How to exchange secrets by oblivious transfer, Aiken Computation Lab, University Harvard, USA, Technical Report TR-81 (1981)
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28, 637–647 (1985)
Yao, A.: Protocols for secure computation. In: Proceedings 23rd Annual Symposium on Foundations of Computer Science (FOCS), pp. 160–164 (1982)
Kolesnikov, V., Sadeghi, A., Schneider, T.T.: Improved garbled circuit building blocks and applications to auctions and computing minima. Crypt. Network Secur. (2009)
Goldreich, O., Micali, S., Wigderson, A.: How to Solve any Protocol Problem. In: Proceedings of STOC (1987)
Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643–662. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_38
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, R., Sun, M. (2020). Efficient Privacy-Preserving Binary Tree Search. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-62223-7_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62222-0
Online ISBN: 978-3-030-62223-7
eBook Packages: Computer ScienceComputer Science (R0)