Skip to main content
Top

2018 | OriginalPaper | Chapter

Privacy-Preserving SAT Solving Based on Projection-Equivalence CNF Obfuscation

Authors : Ying Qin, Xiao Yang Shen, Zhen Yue Du

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we study the problem of privacy-preserving SAT solving in the cloud computing paradigm. we present a CNF obfuscation algorithm and its corresponding solution recovery algorithm, to prevent unauthorized third party obtaining sensitive information. By obfuscation, the CNF formula is transformed into another formula with different circuit structure and projection-equivalence over-approximated solution space. Solution of the original CNF can be extracted from the solution of obfuscated CNF by projection based solution recovery algorithm. Theoretical analysis demonstrates that, obfuscation algorithm can change the structure of CNF formula with polynomial time complexity, while solution recovery algorithm can filter out solution with linear time complexity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Hachtel, G., Somenzi, F.: Logic Synthesis and Verification Algorithms, vol. I-XXIII, pp. 1–564. Springer, Heidelberg (2006)MATH Hachtel, G., Somenzi, F.: Logic Synthesis and Verification Algorithms, vol. I-XXIII, pp. 1–564. Springer, Heidelberg (2006)MATH
6.
go back to reference Tseitin, G.: On the complexity of derivation in propositional calculus. Stud. Constr. Math. Math. Logic (1968) Tseitin, G.: On the complexity of derivation in propositional calculus. Stud. Constr. Math. Math. Logic (1968)
7.
go back to reference Li, C.: Integrating equivalency reasoning into Davis-Putnam procedure. In: AAAI/IAAI 2000, pp. 291–296 (2000) Li, C.: Integrating equivalency reasoning into Davis-Putnam procedure. In: AAAI/IAAI 2000, pp. 291–296 (2000)
9.
go back to reference Roy, J., Markov, I., Bertacco, V.: Restoring circuit structure from SAT instances. In: IWLS 2004, pp. 361–368 (2004) Roy, J., Markov, I., Bertacco, V.: Restoring circuit structure from SAT instances. In: IWLS 2004, pp. 361–368 (2004)
10.
go back to reference Fu, Z., Malik, S.: Extracting logic circuit structure from conjunctive normal form descriptions. In: VLSI Design, pp. 37–42 (2007) Fu, Z., Malik, S.: Extracting logic circuit structure from conjunctive normal form descriptions. In: VLSI Design, pp. 37–42 (2007)
12.
go back to reference Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., Loureiro, S.: A security analysis of Amazon’s elastic compute cloud service. In: SAC 2012, pp. 1427–1434 (2012) Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., Loureiro, S.: A security analysis of Amazon’s elastic compute cloud service. In: SAC 2012, pp. 1427–1434 (2012)
13.
go back to reference Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS 2009, pp. 199–212 (2009) Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS 2009, pp. 199–212 (2009)
14.
go back to reference Achlioptas, D., Gomes, C., Kautz, H., Selman, B.: Generating satisfiable problem instances. In: AAAI/IAAI 2000, pp. 256–261 (2000) Achlioptas, D., Gomes, C., Kautz, H., Selman, B.: Generating satisfiable problem instances. In: AAAI/IAAI 2000, pp. 256–261 (2000)
15.
go back to reference Jarvisalo, M.: Equivalence checking hardware multiplier designs. SAT Competition 2007 Benchmark Description Jarvisalo, M.: Equivalence checking hardware multiplier designs. SAT Competition 2007 Benchmark Description
17.
go back to reference Brakerski, Z., Rothblum, G.: Black-box obfuscation for d-CNFs. In: ITCS 2014, pp. 235–250 (2014) Brakerski, Z., Rothblum, G.: Black-box obfuscation for d-CNFs. In: ITCS 2014, pp. 235–250 (2014)
21.
go back to reference Zhang, X., He, F., Zuo, W.: Theory and practice of program obfuscation. In: Crisan, M. (ed.) Convergence and Hybrid Information Technologies, p. 426. INTECH, Croatia, March 2010. ISBN 978-953-307-068-1 Zhang, X., He, F., Zuo, W.: Theory and practice of program obfuscation. In: Crisan, M. (ed.) Convergence and Hybrid Information Technologies, p. 426. INTECH, Croatia, March 2010. ISBN 978-953-307-068-1
22.
go back to reference Karypis, G., Aggarwal, R., Kumar, V., Shekhar, S.: Multilevel hypergraph partitioning: application in VLSI domain. In: DAC 1997, pp. 526–529 (1997) Karypis, G., Aggarwal, R., Kumar, V., Shekhar, S.: Multilevel hypergraph partitioning: application in VLSI domain. In: DAC 1997, pp. 526–529 (1997)
25.
go back to reference Qin, Y., Shen, S.Y., Jia, Y.: Structure-aware CNF obfuscation for privacy-preserving SAT solving. In: MEMOCODE 2014, pp. 84–93 (2014) Qin, Y., Shen, S.Y., Jia, Y.: Structure-aware CNF obfuscation for privacy-preserving SAT solving. In: MEMOCODE 2014, pp. 84–93 (2014)
Metadata
Title
Privacy-Preserving SAT Solving Based on Projection-Equivalence CNF Obfuscation
Authors
Ying Qin
Xiao Yang Shen
Zhen Yue Du
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-01689-0_18

Premium Partner