Phasing: Private Set Intersection using Permutation-based Hashing

被引:0
|
作者
Pinkas, Benny [1 ]
Schneider, Thomas [2 ]
Segev, Gil [3 ]
Zohner, Michael [2 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
[2] Tech Univ Darmstadt, Darmstadt, Germany
[3] Hebrew Univ Jerusalem, Jerusalem, Israel
基金
以色列科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private Set Intersection (PSI) allows two parties to compute the intersection of private sets while revealing nothing more than the intersection itself. PSI needs to be applied to large data sets in scenarios such as measurement of ad conversion rates, data sharing, or contact discovery. Existing PSI protocols do not scale up well, and therefore some applications use insecure solutions instead. We describe a new approach for designing PSI protocols based on permutation-based hashing, which enables to reduce the length of items mapped to bins while ensuring that no collisions occur. We denote this approach as Phasing, for Permutation-based Hashing Set Intersection. Phasing can dramatically improve the performance of PSI protocols whose overhead depends on the length of the representations of input items. We apply Phasing to design a new approach for circuit-based PSI protocols. The resulting protocol is up to 5 times faster than the previously best Sort-Compare Shuffle circuit of Huang et al. (NDSS 2012). We also apply Phasing to the OT-based PSI protocol of Pinkas et al. (USENIX Security 2014), which is the fastest PSI protocol to date. Together with additional improvements that reduce the computation complexity by a logarithmic factor, the resulting protocol improves run-time by a factor of up to 20 and can also have similar communication overhead as the previously best PSI protocol in that respect. The new protocol is only moderately less efficient than an insecure PSI protocol that is currently used by real-world applications, and is therefore the first secure PSI protocol that is scalable to the demands and the constraints of current real-world settings.
引用
收藏
页码:515 / 530
页数:16
相关论文
共 50 条
  • [41] Runtime Analysis for Permutation-based Evolutionary Algorithms
    Doerr, Benjamin
    Ghannane, Yassine
    Ibn Brahim, Marouane
    ALGORITHMICA, 2024, 86 (01) : 90 - 129
  • [42] On Generalizing Permutation-Based Representations for Approximate Search
    Vadicamo, Lucia
    Gennaro, Claudio
    Amato, Giuseppe
    SIMILARITY SEARCH AND APPLICATIONS, SISAP 2021, 2021, 13058 : 66 - 80
  • [43] Design and analysis of permutation-based pyramid broadcasting
    Charu C. Aggarwal
    Joel L. Wolf
    Philip S. Yu
    Multimedia Systems, 1999, 7 : 439 - 448
  • [44] Permutation-based time irreversibility in epileptic electroencephalograms
    Wenpo Yao
    Jiafei Dai
    Matjaž Perc
    Jun Wang
    Dezhong Yao
    Daqing Guo
    Nonlinear Dynamics, 2020, 100 : 907 - 919
  • [45] Limitation of permutation-based differential correlation analysis
    Song, Hoseung
    Wu, Michael C.
    GENETIC EPIDEMIOLOGY, 2023, 47 (08) : 637 - 641
  • [46] PAEQ: Parallelizable permutation-based authenticated encryption
    Biryukov, Alex (alex.biryukov@uni.lu), 1600, Springer Verlag (8783):
  • [47] Permutation-Based Approximate Multiplier with High Accuracy
    Li, Kunlong
    Dai, Yunfei
    Li, Zhen
    Wang, Lingli
    Proceedings of International Conference on ASIC, 2023,
  • [48] Permutation-based time irreversibility in epileptic electroencephalograms
    Yao, Wenpo
    Dai, Jiafei
    Perc, Matjaz
    Wang, Jun
    Yao, Dezhong
    Guo, Daqing
    NONLINEAR DYNAMICS, 2020, 100 (01) : 907 - 919
  • [49] A Study of the Private Set Intersection Protocol Based on Negative Databases
    Zhao, Dongdong
    Luo, Wenjian
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 58 - 64
  • [50] Server-aided private set intersection based on reputation
    Zhang, En
    Li, Fenghua
    Niu, Ben
    Wang, Yanchao
    INFORMATION SCIENCES, 2017, 387 : 180 - 194