Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter

被引:66
|
作者
Debnath, Sumit Kumar [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
关键词
(A)PSI-CA; (A)PSI; Semi-honest adversary; Malicious adversary; Privacy; Bloom filter;
D O I
10.1007/978-3-319-23318-5_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We first present a Private Set Intersection Cardinality (PSICA) protocol followed by its authorized variant, APSI-CA, utilizing Bloom filter (BF). We further extend these to PSI and APSI protocols. All the constructions are proven to be secure in standard model with linear complexities. Moreover, our protocols hide the size of the client's private set which may be sensitive in application specific scenarios. The proposed PSI-CA and APSI-CA are the first to achieve security in standard model under the Quadratic Residuosity (QR) assumption with linear complexities.
引用
收藏
页码:209 / 226
页数:18
相关论文
共 50 条
  • [31] Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters
    Inbar, Roi
    Omri, Eran
    Pinkas, Benny
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 235 - 252
  • [32] SE-PSI: Fog/Cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter
    Qiu, Shuo
    Zhang, Zheng
    Liu, Yanan
    Yan, Hao
    Cheng, Yuan
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (02) : 1861 - 1876
  • [33] Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
    Egert, Rolf
    Fischlin, Marc
    Gens, David
    Jacob, Sven
    Senker, Matthias
    Tillmanns, Joern
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 413 - 430
  • [34] Efficient Robust Private Set Intersection
    Dachman-Soled, Dana
    Malkin, Tal
    Raykova, Mariana
    Yung, Moti
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 125 - 142
  • [35] Efficient private matching and set intersection
    Freedman, MJ
    Nissim, K
    Pinkas, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 1 - 19
  • [36] Efficient Threshold Private Set Intersection
    Zhang, En
    Chang, Jian
    Li, Yu
    IEEE ACCESS, 2021, 9 : 6560 - 6570
  • [37] Permutation-based outsourced private set intersection cardinality protocol
    Zhang, Jing
    Zhang, Qingbin
    Tang, Yongli
    Zha, Chunming
    Zeng, Yanru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (11): : 3306 - 3323
  • [38] Quantum private set intersection cardinality and its application to anonymous authentication
    Shi, Run-hua
    Mu, Yi
    Zhong, Hong
    Zhang, Shun
    Cui, Jie
    INFORMATION SCIENCES, 2016, 370 : 147 - 158
  • [39] Unbalanced private set intersection cardinality protocol with low communication cost
    Lv, Siyi
    Ye, Jinhui
    Yin, Sijie
    Cheng, Xiaochun
    Feng, Chen
    Liu, Xiaoyan
    Li, Rui
    Li, Zhaohui
    Liu, Zheli
    Zhou, Li
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 1054 - 1061
  • [40] PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality
    Yang, Qianheng
    Yang, Yuer
    Xu, Shiyuan
    Guo, Rongrong
    Xian, Huiguang
    Lin, Yifeng
    Chen, Xue
    Tan, Wuzheng
    Yiu, Siu-Ming
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)