Multi-party private set intersection: An information-theoretic approach

被引:16
|
作者
Wang Z. [1 ]
Banawan K. [2 ]
Ulukus S. [1 ]
机构
[1] The Department of Electrical and Computer Engineering, University of Maryland, College Park, 20742, MD
[2] The Electrical Engineering Department, Faculty of Engineering, Alexandria University, Alexandria
关键词
Private set intersection; Secure multi-party computation; Symmetric private information retrieval;
D O I
10.1109/JSAIT.2021.3057597
中图分类号
学科分类号
摘要
We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there are M parties, each storing a data set Pi over Ni replicated and non-colluding databases, and we want to calculate the intersection of the data sets ∩Mi=1Pi without leaking any information beyond the set intersection to any of the parties. We consider a specific communication protocol where one of the parties, called the leader party, initiates the MP-PSI protocol by sending queries to the remaining parties which are called client parties. The client parties are not allowed to communicate with each other. We propose an information-theoretic scheme that privately calculates the intersection ∩Mi=1Pi with a download cost of D = mint∈{1,...,M}-i∈{1,...,M}t⌈|NPit-|N1i ⌉. Similar to the 2-party PSI problem, our scheme builds on the connection between the PSI problem and the multi-message symmetric private information retrieval (MM-SPIR) problem. Our scheme is a non-trivial generalization of the 2-party PSI scheme as it needs an intricate design of the shared common randomness. Interestingly, in terms of the download cost, our scheme does not incur any penalty due to the more stringent privacy constraints in the MP-PSI problem compared to the 2-party PSI problem. © 2021 IEEE.
引用
收藏
页码:366 / 379
页数:13
相关论文
共 50 条
  • [31] A geometric approach to information-theoretic private information retrieval
    Woodruff, D
    Yekhanin, S
    TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2005, : 275 - 284
  • [32] A geometric approach to information-theoretic private information retrieval
    Woodruff, David
    Yekhanin, Sergey
    SIAM JOURNAL ON COMPUTING, 2007, 37 (04) : 1046 - 1056
  • [33] Multi-party Private Set Operations with an External Decider
    Ramezanian, Sara
    Meskanen, Tommi
    Niemi, Valtteri
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 117 - 135
  • [34] Post-quantum secure multi-party private set-intersection in star network topology
    Debnath, Sumit Kumar
    Choudhury, Tanmay
    Kundu, Nibedita
    Dey, Kunal
    Journal of Information Security and Applications, 2021, 58
  • [35] Post-quantum secure multi-party private set-intersection in star network topology
    Debnath, Sumit Kumar
    Choudhury, Tanmay
    Kundu, Nibedita
    Dey, Kunal
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [36] Secure Multi-Party Quantum Private Information Query
    Tao, Hong
    Tan, Xiaoqing
    Song, Tingting
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) : 1099 - 1108
  • [37] Secure Multi-Party Quantum Private Information Query
    Hong Tao
    Xiaoqing Tan
    Tingting Song
    International Journal of Theoretical Physics, 2020, 59 : 1099 - 1108
  • [38] Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting
    Wei, Lifei
    Liu, Jihai
    Zhang, Lei
    Zhang, Wuji
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 118 - 132
  • [39] Information-theoretic and set-theoretic similarity
    Cazzanti, Luca
    Gupta, Maya R.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1836 - +
  • [40] Two Cloud-assisted Over-threshold Multi-party Private Set Intersection Calculation Protocol
    Wei L.-F.
    Liu J.-H.
    Zhang L.
    Ning J.-T.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5442 - 5456