Shuffle-based Private Set Union: Faster and More Secure

被引:0
|
作者
Jia, Yanxue [1 ]
Sun, Shi-Feng [1 ]
Zhou, Hong-Sheng [2 ]
Du, Jiajun [1 ]
Gu, Dawu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[2] Virginia Commonwealth Univ, Richmond, VA 23284 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private Set Union (PSU) allows two players, the sender and the receiver, to compute the union of their input datasets without revealing any more information than the result. While it has found numerous applications in practice, not much research has been carried out so far, especially for large datasets. In this work, we take shuffling technique as a key to design PSU protocols for the first time. By shuffling receiver's set, we put forward the first protocol, denoted as Pi(R)(PSU), that eliminates the expensive operations in previous works, such as additive homomorphic encryption and repeated operations on the receiver's set. It outperforms the state-of-the-art design by Kolesnikov et al. (ASIACRYPT 2019) in both efficiency and security; the unnecessary leakage in Kolesnikov et al.'s design, can be avoided in our design. We further extend our investigation to the application scenarios in which both players may hold unbalanced input datasets. We propose our second protocol Pi(S)(PSU), by shuffling the sender's dataset. This design can be viewed as a dual version of our first protocol, and it is suitable in the cases where the sender's input size is much smaller than the receiver's. Finally, we implement our protocols Pi(R)(PSU) and Pi(S)(PSU) in C++ on big datasets, and perform a comprehensive evaluation in terms of both scalability and parallelizability. The results demonstrate that our design can obtain a 4-5 x improvement over the state-of-the-art by Kolesnikov et al. with a single thread in WAN/LAN settings.
引用
收藏
页码:2947 / 2964
页数:18
相关论文
共 50 条
  • [31] Quantum Protocols for Private Set Intersection Cardinality and Union Cardinality Based on Entanglement Swapping
    Yongli Wang
    Peichu Hu
    Qiuliang Xu
    International Journal of Theoretical Physics, 2021, 60 : 3514 - 3528
  • [32] Quantum Protocols for Private Set Intersection Cardinality and Union Cardinality Based on Entanglement Swapping
    Wang, Yongli
    Hu, Peichu
    Xu, Qiuliang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (09) : 3514 - 3528
  • [33] Faster unbalanced Private Set Intersection in the semi-honest setting
    Davi Resende, Amanda Cristina
    de Freitas Aranha, Diego
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) : 21 - 38
  • [34] Faster unbalanced Private Set Intersection in the semi-honest setting
    Amanda Cristina Davi Resende
    Diego de Freitas Aranha
    Journal of Cryptographic Engineering, 2021, 11 : 21 - 38
  • [35] Faster fog-aided private set intersectionwith integrity preserving
    Qiang Wang
    Fu-cai Zhou
    Tie-min Ma
    Zi-feng Xu
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1558 - 1568
  • [36] Faster fog-aided private set intersectionwith integrity preserving
    Wang, Qiang
    Zhou, Fu-cai
    Ma, Tie-min
    Xu, Zi-feng
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (12) : 1558 - 1568
  • [37] Malicious Secure, Structure-Aware Private Set Intersection
    Garimella, Gayathri
    Rosulek, Mike
    Singh, Jaspal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 577 - 610
  • [38] Provably Secure Contact Tracing with Conditional Private Set Intersection
    Takeshita, Jonathan
    Karl, Ryan
    Mohammed, Alamin
    Striegel, Aaron
    Jung, Taeho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 352 - 373
  • [39] Quantum Secure Disease Surveillance Through Private Set Intersection
    Sarkar, Sushmita
    Mohanty, Tapaswini
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Das, Ashok Kumar
    Park, Youngho
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 5585 - 5596
  • [40] Provably Secure Private Set Intersection With Constant Communication Complexity
    Debnath, Sumit Kumar
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2019, 9 (02) : 39 - 64