Edit distance based encryption and its application

Tran Viet Xuan Phuong*, Guomin Yang, Willy Susilo, Kaitai Liang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)


Edit distance, also known as Levenshtein distance, is a very useful tool to measure the similarity between two strings. It has been widely used in many applications such as natural language processing and bioinformatics. In this paper, we introduce a new type of fuzzy public key encryption called Edit Distance-based Encryption (EDE). In EDE, the encryptor can specify an alphabet string and a threshold when encrypting a message, and a decryptor can obtain a decryption key generated from another alphabet string, and the decryption will be successful if and only if the edit distance between the two strings is within the pre-defined threshold. We provide a formal definition and security model for EDE, and propose an EDE scheme that can securely evaluate the edit distance between two strings embedded in the ciphertext and the secret key. We also show an interesting application of our EDE scheme named Fuzzy Broadcast Encryption which is very useful in a broadcasting network.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
PublisherSpringer Verlag
Number of pages17
ISBN (Print)9783319403663
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventAustralasian Conference on Information Security and Privacy - Melbourne, Australia
Duration: 4 Jul 20166 Jul 2016
Conference number: 21

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


ConferenceAustralasian Conference on Information Security and Privacy
Abbreviated titleACISP


  • Dynamic programming
  • Edit distance
  • Fuzzy encryption
  • Viète’s formulas


Dive into the research topics of 'Edit distance based encryption and its application'. Together they form a unique fingerprint.

Cite this