New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness

被引:7
|
作者
Debnath, Sumit Kumar [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
关键词
mPSI; mPSI-CA; Malicious adversary; Fairness; Semi-trusted arbiter; MALICIOUS ADVERSARIES; CARDINALITY; ENCRYPTION; DECRYPTION; OPERATIONS;
D O I
10.1007/978-3-319-53177-9_14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Private Set Intersection (PSI) is a useful cryptographic primitive for developing practical privacy preserving techniques for Big Data. PSI allows entities to securely extract intersection of the large data sets they own, without revealing any other crucial information for their input sets. Fairness is a critical issue for both mutual Private Set Intersection (mPSI) and its cardinality variant, namely mutual Private Set Intersection Cardinality (mPSI-CA). Achieving fairness over prime order groups with linear complexity in malicious model remains an interesting challenge for both mPSI and mPSI-CA. None of the prior works achieve all the aforementioned properties together. We address these issues using an off-line semi-trusted third party, called arbiter. Arbiter is semi-trusted in the sense that he cannot get access to the private information of the parties but follow the protocol honestly. In this work, we propose a construction of fair and efficient mPSI with linear communication and computation overheads using prime order groups. Our mPSI employs (Distributed) ElGamal encryption and the verifiable encryption of Cramer-Shoup. A concrete security analysis is provided against malicious parties under Decisional Diffie-Hellman (DDH) assumption. We further extend our mPSI to mPSI-CA retaining all the security properties of mPSI. On a more positive note, our mPSI-CA is the first in its kind with linear complexity preserving fairness.
引用
收藏
页码:254 / 284
页数:31
相关论文
共 50 条
  • [41] An information-theoretically secure quantum multiparty private set intersection
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [42] Malicious-Secure Private Set Intersection via Dual Execution
    Rindal, Peter
    Rosulek, Mike
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1229 - 1242
  • [43] Quantum Secure Multi-party Private Set Intersection Cardinality
    Liu, Bai
    Zhang, Mingwu
    Shi, Runhua
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 1992 - 2007
  • [44] PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
    Ben-Efraim, Aner
    Nissenbaum, Olga
    Omri, Eran
    Paskin-Cherniaysky, Anat
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1098 - 1112
  • [45] Quantum Secure Multi-party Private Set Intersection Cardinality
    Bai Liu
    Mingwu Zhang
    Runhua Shi
    International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
  • [46] Efficient Privacy Preserving Reputation Protocols Inspired by Secure Sum
    Hasan, Omar
    Bertino, Elisa
    Brunie, Lionel
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 126 - 133
  • [47] Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing
    Wu, Mingli
    Yuen, Tsz Hon
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 283 - 300
  • [48] An Efficient Private Set Intersection Protocol for the Cloud Computing Environments
    Ruan, Ou
    Huang, Xiongbo
    Mao, Hao
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 254 - 259
  • [49] Private and Efficient Set Intersection Protocol for Big Data Analytics
    Gheid, Zakaria
    Challal, Yacine
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 149 - 164
  • [50] Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols
    Carpent, Xavier
    Hwang, Seoyeon
    Tsudik, Gene
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 26 - 57