Multi-party private set intersection: An information-theoretic approach

被引:16
|
作者
Wang Z. [1 ]
Banawan K. [2 ]
Ulukus S. [1 ]
机构
[1] The Department of Electrical and Computer Engineering, University of Maryland, College Park, 20742, MD
[2] The Electrical Engineering Department, Faculty of Engineering, Alexandria University, Alexandria
关键词
Private set intersection; Secure multi-party computation; Symmetric private information retrieval;
D O I
10.1109/JSAIT.2021.3057597
中图分类号
学科分类号
摘要
We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there are M parties, each storing a data set Pi over Ni replicated and non-colluding databases, and we want to calculate the intersection of the data sets ∩Mi=1Pi without leaking any information beyond the set intersection to any of the parties. We consider a specific communication protocol where one of the parties, called the leader party, initiates the MP-PSI protocol by sending queries to the remaining parties which are called client parties. The client parties are not allowed to communicate with each other. We propose an information-theoretic scheme that privately calculates the intersection ∩Mi=1Pi with a download cost of D = mint∈{1,...,M}-i∈{1,...,M}t⌈|NPit-|N1i ⌉. Similar to the 2-party PSI problem, our scheme builds on the connection between the PSI problem and the multi-message symmetric private information retrieval (MM-SPIR) problem. Our scheme is a non-trivial generalization of the 2-party PSI scheme as it needs an intricate design of the shared common randomness. Interestingly, in terms of the download cost, our scheme does not incur any penalty due to the more stringent privacy constraints in the MP-PSI problem compared to the 2-party PSI problem. © 2021 IEEE.
引用
收藏
页码:366 / 379
页数:13
相关论文
共 50 条
  • [41] Robust information-theoretic private information retrieval
    Beimel, Amos
    Stahl, Yoav
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 295 - 321
  • [42] Provably Private Distributed Averaging Consensus: An Information-Theoretic Approach
    Fereydounian, Mohammad
    Mokhtari, Aryan
    Pedarsani, Ramtin
    Hassani, Hamed
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (11) : 7317 - 7335
  • [43] Robust information-theoretic private information retrieval
    Beimel, A
    Stahl, Y
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 326 - 341
  • [44] Robust Information-Theoretic Private Information Retrieval
    Amos Beimel
    Yoav Stahl
    Journal of Cryptology, 2007, 20 : 295 - 321
  • [45] Information-Theoretic Private Interactive Mechanism
    Moraffah, Bahman
    Sankar, Lalitha
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 911 - 918
  • [46] An Information-Theoretic Approach for Multi-task Learning
    Yang, Pei
    Tan, Qi
    Xu, Hao
    Ding, Yehua
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2009, 5678 : 386 - 396
  • [47] Nearly Optimal Protocols for Computing Multi-party Private Set Union
    Gong, Xuhui
    Hua, Qiang-Sheng
    Jin, Hai
    2022 IEEE/ACM 30TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2022,
  • [48] General constructions for information-theoretic private information retrieval
    Beimel, A
    Ishai, Y
    Kushievitz, E
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (02) : 213 - 247
  • [49] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [50] Non-asymptotic information theoretic bound for some multi-party scenarios
    Sharma, Naresh
    Warsi, Naqueeb Ahmad
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1034 - 1041