New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness

被引:7
|
作者
Debnath, Sumit Kumar [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
关键词
mPSI; mPSI-CA; Malicious adversary; Fairness; Semi-trusted arbiter; MALICIOUS ADVERSARIES; CARDINALITY; ENCRYPTION; DECRYPTION; OPERATIONS;
D O I
10.1007/978-3-319-53177-9_14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Private Set Intersection (PSI) is a useful cryptographic primitive for developing practical privacy preserving techniques for Big Data. PSI allows entities to securely extract intersection of the large data sets they own, without revealing any other crucial information for their input sets. Fairness is a critical issue for both mutual Private Set Intersection (mPSI) and its cardinality variant, namely mutual Private Set Intersection Cardinality (mPSI-CA). Achieving fairness over prime order groups with linear complexity in malicious model remains an interesting challenge for both mPSI and mPSI-CA. None of the prior works achieve all the aforementioned properties together. We address these issues using an off-line semi-trusted third party, called arbiter. Arbiter is semi-trusted in the sense that he cannot get access to the private information of the parties but follow the protocol honestly. In this work, we propose a construction of fair and efficient mPSI with linear communication and computation overheads using prime order groups. Our mPSI employs (Distributed) ElGamal encryption and the verifiable encryption of Cramer-Shoup. A concrete security analysis is provided against malicious parties under Decisional Diffie-Hellman (DDH) assumption. We further extend our mPSI to mPSI-CA retaining all the security properties of mPSI. On a more positive note, our mPSI-CA is the first in its kind with linear complexity preserving fairness.
引用
收藏
页码:254 / 284
页数:31
相关论文
共 50 条
  • [31] Provably Secure Private Set Intersection With Constant Communication Complexity
    Debnath, Sumit Kumar
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2019, 9 (02) : 39 - 64
  • [32] Quantum Secure Disease Surveillance Through Private Set Intersection
    Sarkar, Sushmita
    Mohanty, Tapaswini
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Das, Ashok Kumar
    Park, Youngho
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 5585 - 5596
  • [33] Privacy preserving set intersection protocol secure against malicious behaviors
    Sang, Yingpeng
    Shen, Hong
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 461 - 468
  • [34] Efficient Updateable Private Set Intersection on Outsourced Datasets
    Zhang, Yan
    Wang, Luyao
    Zhou, Lu
    WEB AND BIG DATA, APWEB-WAIM 2024, PT IV, 2024, 14964 : 84 - 99
  • [35] Efficient Multiparty Probabilistic Threshold Private Set Intersection
    Liu, Feng-Hao
    Zhang, En
    Qin, Leiyong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2188 - 2201
  • [36] Efficient Quantum Protocol for Private Set Intersection Cardinality
    Shi, Run-Hua
    IEEE ACCESS, 2018, 6 : 73102 - 73109
  • [37] EMPSI: Efficient multiparty private set intersection (with cardinality)
    Yang, Yunbo
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    Li, Ruofan
    Yang, Yihao
    Dou, Shangmin
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [38] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522
  • [39] Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
    Hu, Jingwei
    Zhao, Yongjun
    Tan, Benjamin Hong Meng
    Aung, Khin Mi Mi
    Wang, Huaxiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6184 - 6196
  • [40] Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
    Abadi, Aydin
    Murdoch, Steven J.
    Zacharias, Thomas
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 721 - 742