New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness

被引:7
|
作者
Debnath, Sumit Kumar [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
关键词
mPSI; mPSI-CA; Malicious adversary; Fairness; Semi-trusted arbiter; MALICIOUS ADVERSARIES; CARDINALITY; ENCRYPTION; DECRYPTION; OPERATIONS;
D O I
10.1007/978-3-319-53177-9_14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Private Set Intersection (PSI) is a useful cryptographic primitive for developing practical privacy preserving techniques for Big Data. PSI allows entities to securely extract intersection of the large data sets they own, without revealing any other crucial information for their input sets. Fairness is a critical issue for both mutual Private Set Intersection (mPSI) and its cardinality variant, namely mutual Private Set Intersection Cardinality (mPSI-CA). Achieving fairness over prime order groups with linear complexity in malicious model remains an interesting challenge for both mPSI and mPSI-CA. None of the prior works achieve all the aforementioned properties together. We address these issues using an off-line semi-trusted third party, called arbiter. Arbiter is semi-trusted in the sense that he cannot get access to the private information of the parties but follow the protocol honestly. In this work, we propose a construction of fair and efficient mPSI with linear communication and computation overheads using prime order groups. Our mPSI employs (Distributed) ElGamal encryption and the verifiable encryption of Cramer-Shoup. A concrete security analysis is provided against malicious parties under Decisional Diffie-Hellman (DDH) assumption. We further extend our mPSI to mPSI-CA retaining all the security properties of mPSI. On a more positive note, our mPSI-CA is the first in its kind with linear complexity preserving fairness.
引用
收藏
页码:254 / 284
页数:31
相关论文
共 50 条
  • [21] Efficient multi-party private set intersection protocols for large participants and small sets
    Wei, Lifei
    Liu, Jihai
    Zhang, Lei
    Wang, Qin
    Zhang, Wuji
    Qian, Xiansong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [22] An efficient quantum scheme for Private Set Intersection
    Shi, Run-hua
    Mu, Yi
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    QUANTUM INFORMATION PROCESSING, 2016, 15 (01) : 363 - 371
  • [23] Efficient and Private Set Intersection of Human Genomes
    Shen, Liyan
    Chen, Xiaojun
    Wang, Dakui
    Fang, Binxing
    Dong, Ye
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2018, : 761 - 764
  • [24] An efficient quantum scheme for Private Set Intersection
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    Quantum Information Processing, 2016, 15 : 363 - 371
  • [25] Practical Multi-Party Private Set Intersection Protocols
    Bay, Asli
    Erkin, Zekeriya
    Hoepman, Jaap-Henk
    Samardjiska, Simona
    Vos, Jelle
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1 - 15
  • [26] Card-Based Protocols for Private Set Intersection and Union
    Doi, Anastasiia
    Ono, Tomoki
    Abe, Yoshiki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    NEW GENERATION COMPUTING, 2024, 42 (03) : 359 - 380
  • [27] Efficient Delegated Private Set Intersection on Outsourced Private Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Metere, Roberto
    Dong, Changyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 608 - 624
  • [28] Card-based Cryptographic Protocols for Private Set Intersection
    Doi, Anastasiia
    Ono, Tomoki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    2022 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, ISITA, 2022, : 239 - 243
  • [29] Malicious Secure, Structure-Aware Private Set Intersection
    Garimella, Gayathri
    Rosulek, Mike
    Singh, Jaspal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 577 - 610
  • [30] Provably Secure Contact Tracing with Conditional Private Set Intersection
    Takeshita, Jonathan
    Karl, Ryan
    Mohammed, Alamin
    Striegel, Aaron
    Jung, Taeho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 352 - 373