Fair Private Set Intersection with a Semi-trusted Arbiter

被引:0
|
作者
Dong, Changyu [1 ]
Chen, Liqun [2 ]
Camenisch, Jan [3 ]
Russello, Giovanni [4 ]
机构
[1] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow G1 1XQ, Lanark, Scotland
[2] Hewlett Packard Labs, Bristol, Avon, England
[3] IBM Res, Zurich, Switzerland
[4] Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
来源
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII | 2013年 / 7964卷
关键词
SECURE; EXCHANGE; COMPUTATION; PROTOCOLS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A private set intersection (PSI) protocol allows two parties to compute the intersection of their input sets privately. Most of the previous PSI protocols only output the result to one party and the other party gets nothing from running the protocols. However, a mutual PSI protocol in which both parties can get the output is highly desirable in many applications. A major obstacle in designing a mutual PSI protocol is how to ensure fairness. In this paper we present the first fair mutual PSI protocol which is efficient and secure. Fairness of the protocol is obtained in an optimistic fashion, i.e. by using an offline third party arbiter. In contrast to many optimistic protocols which require a fully trusted arbiter, in our protocol the arbiter is only required to be semi-trusted, in the sense that we consider it to be a potential threat to both parties' privacy but believe it will follow the protocol. The arbiter can resolve disputes without knowing any private information belongs to the two parties. This feature is appealing for a PSI protocol in which privacy may be of ultimate importance.
引用
收藏
页码:128 / 144
页数:17
相关论文
共 50 条
  • [1] Fair Threshold Decryption with Semi-Trusted Third Parties
    Hong, Jeongdae
    Kim, Jinil
    Kim, Jihye
    Franklin, Matthew K.
    Park, Kunsoo
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 309 - +
  • [2] Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (06) : 1035 - 1045
  • [3] A Fair Transaction Protocol with an Offline Semi-Trusted Third Party
    Qian, Wang
    Qi, Su
    ADVANCES IN INTELLIGENT DECISION TECHNOLOGIES, 2010, 4 : 249 - 257
  • [4] A non-repudiation fair exchange protocol with semi-trusted third party
    2001, Huazhong University of Science and Technology (29):
  • [5] Encryption over Semi-trusted Database
    Kadhem, Hasan
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2009, 5667 : 358 - 362
  • [6] Adapting ATLAS@Home to trusted and semi-trusted resources
    Cameron, David
    Garonne, Vincent
    Millar, Paul
    Sun, Shaojun
    Wu, Wenjing
    24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [7] Fair Private Set Intersection Using Smart Contracts
    Avizheh, Sepideh
    Safavi-Naini, Reihaneh
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 74 - 104
  • [8] Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment
    Wang, Chih-Hung
    Wang, Chien-Ming
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 130 - 135
  • [9] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
    Wu Qingtao
    zhang Hongyi
    Pu Jiexin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
  • [10] A fair exchange protocol based on short signature with the off-line semi-trusted third party
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2007, 1 (92-95):