Threshold Private Set Intersection with Better Communication Complexity

被引:2
|
作者
Ghosh, Satrajit [1 ]
Simkin, Mark [2 ]
机构
[1] Indian Inst Technol Kharagpur, Kharagpur, W Bengal, India
[2] Ethereum Fdn, Aarhus, Denmark
来源
关键词
D O I
10.1007/978-3-031-31371-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given l parties with sets X-1,..., X-l of size n, we would like to securely compute the intersection boolean AND(l)(i=1) X-i, if it is larger than n-t for some threshold t, without revealing any other additional information. It has previously been shown (Ghosh and Simkin, Crypto 2019) that this function can be securely computed with a communication complexity that only depends on t and in particular does not depend on n. For small values of t, this results in protocols that have a communication complexity that is sublinear in the size of the inputs. Current protocols either rely on fully homomorphic encryption or have an at least quadratic dependency on the parameter t. In this work, we construct protocols with a quasilinear dependency on t from simple assumptions like additively homomorphic encryption and oblivious transfer. All existing approaches, including ours, rely on protocols for computing a single bit, which indicates whether the intersection is larger than n-t without actually computing it. Our key technical contribution, which may be of independent interest, takes any such protocol with secret shared outputs and communication complexity O(lambda l poly(t)), where lambda is the security parameter, and transforms it into a protocol with communication complexity O(lambda(2)lt polylog(t)).
引用
收藏
页码:251 / 272
页数:22
相关论文
共 50 条
  • [41] Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity
    Badrinarayanan, Saikrishna
    Miao, Peihan
    Shi, Xinyi
    Tromanhauser, Max
    Zeng, Ruida
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VI, 2025, 15489 : 200 - 233
  • [42] The Communication Complexity of Set-Disjointness with Small Sets and 0-1 Intersection
    Kushilevitz, Eyal
    Weinreb, Enav
    2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS, 2009, : 63 - 72
  • [43] Intersection-policy private mutual authentication from authorized private set intersection
    Wen, Yamin
    Zhang, Fangguo
    Wang, Huaxiong
    Miao, Yinbin
    Gong, Zheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (02)
  • [44] Intersection-policy private mutual authentication from authorized private set intersection
    Yamin WEN
    Fangguo ZHANG
    Huaxiong WANG
    Yinbin MIAO
    Zheng GONG
    Science China(Information Sciences), 2020, 63 (02) : 116 - 130
  • [45] Intersection-policy private mutual authentication from authorized private set intersection
    Yamin Wen
    Fangguo Zhang
    Huaxiong Wang
    Yinbin Miao
    Zheng Gong
    Science China Information Sciences, 2020, 63
  • [46] Efficient Delegated Private Set Intersection on Outsourced Private Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Metere, Roberto
    Dong, Changyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 608 - 624
  • [47] PRIVATE SET-INTERSECTION WITH COMMON SET-UP
    Chatterjee, Sanjit
    Kamath, Chethan
    Kumar, Vikas
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2018, 12 (01) : 17 - 47
  • [48] Private Set Intersection: Past, Present and Future
    Andreea, Ionita
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 680 - 685
  • [49] An efficient quantum scheme for Private Set Intersection
    Shi, Run-hua
    Mu, Yi
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    QUANTUM INFORMATION PROCESSING, 2016, 15 (01) : 363 - 371
  • [50] Feasible private set intersection in quantum domain
    Debnath, Sumit Kumar
    Dey, Kunal
    Kundu, Nibedita
    Choudhury, Tanmay
    QUANTUM INFORMATION PROCESSING, 2021, 20 (01)