Phasing: Private Set Intersection using Permutation-based Hashing

被引:0
|
作者
Pinkas, Benny [1 ]
Schneider, Thomas [2 ]
Segev, Gil [3 ]
Zohner, Michael [2 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
[2] Tech Univ Darmstadt, Darmstadt, Germany
[3] Hebrew Univ Jerusalem, Jerusalem, Israel
基金
以色列科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private Set Intersection (PSI) allows two parties to compute the intersection of private sets while revealing nothing more than the intersection itself. PSI needs to be applied to large data sets in scenarios such as measurement of ad conversion rates, data sharing, or contact discovery. Existing PSI protocols do not scale up well, and therefore some applications use insecure solutions instead. We describe a new approach for designing PSI protocols based on permutation-based hashing, which enables to reduce the length of items mapped to bins while ensuring that no collisions occur. We denote this approach as Phasing, for Permutation-based Hashing Set Intersection. Phasing can dramatically improve the performance of PSI protocols whose overhead depends on the length of the representations of input items. We apply Phasing to design a new approach for circuit-based PSI protocols. The resulting protocol is up to 5 times faster than the previously best Sort-Compare Shuffle circuit of Huang et al. (NDSS 2012). We also apply Phasing to the OT-based PSI protocol of Pinkas et al. (USENIX Security 2014), which is the fastest PSI protocol to date. Together with additional improvements that reduce the computation complexity by a logarithmic factor, the resulting protocol improves run-time by a factor of up to 20 and can also have similar communication overhead as the previously best PSI protocol in that respect. The new protocol is only moderately less efficient than an insecure PSI protocol that is currently used by real-world applications, and is therefore the first secure PSI protocol that is scalable to the demands and the constraints of current real-world settings.
引用
收藏
页码:515 / 530
页数:16
相关论文
共 50 条
  • [1] Permutation-based outsourced private set intersection cardinality protocol
    Zhang, Jing
    Zhang, Qingbin
    Tang, Yongli
    Zha, Chunming
    Zeng, Yanru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (11): : 3306 - 3323
  • [2] Permutation-Based Hashing Beyond the Birthday Bound
    Lefevre, Charlotte
    Mennink, Bart
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 71 - 113
  • [3] Security/efficiency tradeoffs for permutation-based hashing
    Rogaway, Phillip
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 220 - +
  • [4] Permutation-based distributed video coding
    Guo Lihua
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 85 - 89
  • [5] Quantized ranking for permutation-based indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    INFORMATION SYSTEMS, 2015, 52 : 163 - 175
  • [6] Boolean permutation-based key escrow
    Wu, Chuan-Kun
    Varadharajan, Vijay
    Computers and Electrical Engineering, 1999, 25 (04): : 291 - 304
  • [7] Boolean permutation-based key escrow
    Wu, CK
    Varadharajan, V
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 291 - 304
  • [8] Epistasis detection using a permutation-based gradient boosting machine
    Che, Kai
    Liu, Xiaoyan
    Guo, Maozu
    Zhang, Junwei
    Wang, Lei
    Zhang, Yin
    2016 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2016, : 1247 - 1252
  • [9] GSA-Lightning: ultra-fast permutation-based gene set analysis
    Chang, Billy Heung Wing
    Tian, Weidong
    BIOINFORMATICS, 2016, 32 (19) : 3029 - 3031
  • [10] Permutation-based tests of perfect ranking
    Zamanzade, Ehsan
    Arghami, Nasser Reza
    Vock, Michael
    STATISTICS & PROBABILITY LETTERS, 2012, 82 (12) : 2213 - 2220