Threshold Private Set Intersection with Better Communication Complexity

被引:2
|
作者
Ghosh, Satrajit [1 ]
Simkin, Mark [2 ]
机构
[1] Indian Inst Technol Kharagpur, Kharagpur, W Bengal, India
[2] Ethereum Fdn, Aarhus, Denmark
来源
关键词
D O I
10.1007/978-3-031-31371-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given l parties with sets X-1,..., X-l of size n, we would like to securely compute the intersection boolean AND(l)(i=1) X-i, if it is larger than n-t for some threshold t, without revealing any other additional information. It has previously been shown (Ghosh and Simkin, Crypto 2019) that this function can be securely computed with a communication complexity that only depends on t and in particular does not depend on n. For small values of t, this results in protocols that have a communication complexity that is sublinear in the size of the inputs. Current protocols either rely on fully homomorphic encryption or have an at least quadratic dependency on the parameter t. In this work, we construct protocols with a quasilinear dependency on t from simple assumptions like additively homomorphic encryption and oblivious transfer. All existing approaches, including ours, rely on protocols for computing a single bit, which indicates whether the intersection is larger than n-t without actually computing it. Our key technical contribution, which may be of independent interest, takes any such protocol with secret shared outputs and communication complexity O(lambda l poly(t)), where lambda is the security parameter, and transforms it into a protocol with communication complexity O(lambda(2)lt polylog(t)).
引用
收藏
页码:251 / 272
页数:22
相关论文
共 50 条
  • [21] Towards fair mutual private set intersection with linear complexity
    Debnath, Sumit Kumar
    Dutta, Ratna
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1589 - 1612
  • [22] Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity
    Dong, Changyu
    Loukides, Grigorios
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2792 - 2806
  • [23] Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
    Hu, Jingwei
    Zhao, Yongjun
    Tan, Benjamin Hong Meng
    Aung, Khin Mi Mi
    Wang, Huaxiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6184 - 6196
  • [24] Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
    Feng, Qian
    Du, Shenglong
    Tan, Wuzheng
    Weng, Jian
    INFORMATION, 2024, 15 (09)
  • [25] Unbalanced private set intersection cardinality protocol with low communication cost
    Lv, Siyi
    Ye, Jinhui
    Yin, Sijie
    Cheng, Xiaochun
    Feng, Chen
    Liu, Xiaoyan
    Li, Rui
    Li, Zhaohui
    Liu, Zheli
    Zhou, Li
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 1054 - 1061
  • [26] Private Set Intersection Protocol Based on Threshold Scheme in Mobile Social Network
    Zhang, Lili
    Wang, Fei
    Chang, Yanan
    Wang, Jian
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2015, 8 (02) : 74 - 78
  • [27] Practical Over-Threshold Multi-Party Private Set Intersection
    Mahdavi, Rasoul Akhavan
    Humphries, Thomas
    Kacsmar, Bailey
    Krastnikov, Simeon
    Lukas, Nils
    Premkumar, John A.
    Shafieinejad, Masoumeh
    Oya, Simon
    Kerschbaum, Florian
    Blass, Erik-Oliver
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 772 - 783
  • [28] Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
    De Cristofaro, Emiliano
    Kim, Jihye
    Tsudik, Gene
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 213 - +
  • [29] Linear Complexity Private Set Intersection for Secure Two-Party Protocols
    Karakoc, Ferhat
    Kupcu, Alptekin
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 409 - 429
  • [30] Private Computations on Set Intersection
    D'Arco, Paolo
    De Santis, Alfredo
    NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 77 - 95