Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity

被引:29
|
作者
Dong, Changyu [1 ]
Loukides, Grigorios [2 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[2] Kings Coll London, Dept Informat, London WC2R 2LS, England
基金
英国工程与自然科学研究理事会;
关键词
Data privacy; cryptographic protocols; data security; data mining;
D O I
10.1109/TIFS.2017.2721360
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The computation of private set union/intersection cardinality (PSU-CA/PSI-CA) is one of the most intensively studied problems in privacy preserving data mining (PPDM). However, the existing protocols are computationally too expensive to be employed in real-world PPDM applications. In response, we propose efficient approximate protocols, whose accuracy can be tuned according to application requirements. We first propose a two-party PSU-CA protocol based on Flajolet-Martin sketches. The protocol has logarithmic computational/communication complexity and relies mostly on symmetric key operations. Thus, it is much more efficient and scalable than existing protocols. In addition, our protocol can hide its output. This feature is necessary in PPDM applications, since the union cardinality is often an intermediate result that must not be disclosed. We then propose a two-party PSI-CA protocol, which is derived from the PSU-CA protocol with virtually no cost. Both our two-party protocols can be easily extended to the multiparty setting. We also design an efficient masking scheme for ((1)(n))-OT. The scheme is used in optimizing the two-party protocols and is of independent interest, since it can speed up ((1)(n))-OT significantly when n is large. Finally, we show through experiments the effectiveness and efficiency of our protocols.
引用
收藏
页码:2792 / 2806
页数:15
相关论文
共 50 条
  • [21] Quantum Secure Multi-party Private Set Intersection Cardinality
    Bai Liu
    Mingwu Zhang
    Runhua Shi
    International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
  • [22] Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter
    Debnath, Sumit Kumar
    Dutta, Ratna
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 209 - 226
  • [23] Permutation-based outsourced private set intersection cardinality protocol
    Zhang, Jing
    Zhang, Qingbin
    Tang, Yongli
    Zha, Chunming
    Zeng, Yanru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (11): : 3306 - 3323
  • [24] Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting
    Li, Hanyu
    Gao, Ying
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 20 - 39
  • [25] Quantum Secure Multi-party Private Set Intersection Cardinality
    Liu, Bai
    Zhang, Mingwu
    Shi, Runhua
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 1992 - 2007
  • [26] Quantum private set intersection cardinality and its application to anonymous authentication
    Shi, Run-hua
    Mu, Yi
    Zhong, Hong
    Zhang, Shun
    Cui, Jie
    INFORMATION SCIENCES, 2016, 370 : 147 - 158
  • [27] Unbalanced private set intersection cardinality protocol with low communication cost
    Lv, Siyi
    Ye, Jinhui
    Yin, Sijie
    Cheng, Xiaochun
    Feng, Chen
    Liu, Xiaoyan
    Li, Rui
    Li, Zhaohui
    Liu, Zheli
    Zhou, Li
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 1054 - 1061
  • [28] Practical Private Set Intersection Protocols with Linear Complexity
    De Cristofaro, Emiliano
    Tsudik, Gene
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 143 - 159
  • [29] Unbalanced private set intersection with linear communication complexity
    Zhao, Quanyu
    Jiang, Bingbing
    Zhang, Yuan
    Wang, Heng
    Mao, Yunlong
    Zhong, Sheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (03)
  • [30] Threshold Private Set Intersection with Better Communication Complexity
    Ghosh, Satrajit
    Simkin, Mark
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 251 - 272