Threshold Private Set Intersection with Better Communication Complexity

被引:2
|
作者
Ghosh, Satrajit [1 ]
Simkin, Mark [2 ]
机构
[1] Indian Inst Technol Kharagpur, Kharagpur, W Bengal, India
[2] Ethereum Fdn, Aarhus, Denmark
来源
关键词
D O I
10.1007/978-3-031-31371-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given l parties with sets X-1,..., X-l of size n, we would like to securely compute the intersection boolean AND(l)(i=1) X-i, if it is larger than n-t for some threshold t, without revealing any other additional information. It has previously been shown (Ghosh and Simkin, Crypto 2019) that this function can be securely computed with a communication complexity that only depends on t and in particular does not depend on n. For small values of t, this results in protocols that have a communication complexity that is sublinear in the size of the inputs. Current protocols either rely on fully homomorphic encryption or have an at least quadratic dependency on the parameter t. In this work, we construct protocols with a quasilinear dependency on t from simple assumptions like additively homomorphic encryption and oblivious transfer. All existing approaches, including ours, rely on protocols for computing a single bit, which indicates whether the intersection is larger than n-t without actually computing it. Our key technical contribution, which may be of independent interest, takes any such protocol with secret shared outputs and communication complexity O(lambda l poly(t)), where lambda is the security parameter, and transforms it into a protocol with communication complexity O(lambda(2)lt polylog(t)).
引用
收藏
页码:251 / 272
页数:22
相关论文
共 50 条
  • [31] Secure approximate pattern matching protocol via Boolean threshold private set intersection
    Wei, Xiaochao
    Xu, Lin
    Cai, Guopeng
    Wang, Hao
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 9245 - 9266
  • [32] STILL ANOTHER RANK DETERMINATION OF SET INTERSECTION MATRICES WITH AN APPLICATION IN COMMUNICATION COMPLEXITY
    TAMM, U
    APPLIED MATHEMATICS LETTERS, 1994, 7 (02) : 39 - 44
  • [33] Faster Unbalanced Private Set Intersection
    Davi Resende, Amanda C.
    Aranha, Diego F.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 203 - 221
  • [34] Laconic Private Set Intersection and Applications
    Alamati, Navid
    Branco, Pedro
    Dottling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Pu, Sihang
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 94 - 125
  • [35] Laconic updatable private set intersection
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [36] Efficient Robust Private Set Intersection
    Dachman-Soled, Dana
    Malkin, Tal
    Raykova, Mariana
    Yung, Moti
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 125 - 142
  • [37] Efficient private matching and set intersection
    Freedman, MJ
    Nissim, K
    Pinkas, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 1 - 19
  • [38] MESSAGE COMPLEXITY OF THE SET INTERSECTION PROBLEM
    RAMARAO, KVS
    DALEY, R
    MELHEM, R
    INFORMATION PROCESSING LETTERS, 1988, 27 (04) : 169 - 174
  • [39] Multi-party Threshold Private Set Intersection Cardinality Based On Encrypted Bloom Filter
    Zhou, Jie
    Su, Daizhao
    Deng, Jiao
    2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 503 - 511
  • [40] Multi-party Threshold Private Set Intersection Protocol Based on Robust Secret Sharing
    Zhang E.
    Qin L.-Y.
    Yang R.-L.
    Li G.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5424 - 5441