Private Membership Test Protocol with Low Communication Complexity

被引:3
|
作者
Ramezanian, Sara [1 ]
Meskanen, Tommi [1 ]
Naderpour, Masoud [1 ]
Niemi, Valtteri [1 ]
机构
[1] Univ Helsinki, Dept Comp Sci, Helsinki, Finland
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
关键词
Privacy enhancing technologies; Applied cryptography; Private information retrieval; Private membership test; Homomorphic encryption; Bloom filter; Cuckoo filter; INFORMATION-RETRIEVAL;
D O I
10.1007/978-3-319-64701-2_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a practical method to perform private membership test. In this method, clients are able to test whether an item is in a set controlled by the server, without revealing their query items to the server. After executing the queries, the content of server's set remains secret. We apply Bloom filter and Cuckoo filter in the membership test procedure. In order to achieve privacy properties, we present a novel protocol based on homomorphic encryption schemes. We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check a file hash value through the company's database.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 50 条
  • [41] Provably Secure Private Set Intersection With Constant Communication Complexity
    Debnath, Sumit Kumar
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2019, 9 (02) : 39 - 64
  • [42] Quantum Private Information Retrieval has Linear Communication Complexity
    Baumeler, Aemin
    Broadbent, Anne
    JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 161 - 175
  • [43] Private information retrieval with low encoding/decoding complexity
    Dai, Mingjun
    Li, Xiaofeng
    Deng, Haiyan
    Chen, Bin
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (06): : 212 - 220
  • [44] Test generation of a communication protocol in an EFSM model
    Kim, TH
    Hwang, IS
    Jang, IS
    Lee, JY
    Lee, SB
    INFORMATION NETWORKING IN ASIA, 2001, 3 : 219 - 229
  • [45] Test Framework for Communication Protocol Stack Software
    Kim, Jung-In
    Lee, Seung-Jae
    Lee, Sang-Hyun
    Kim, Jong-Han
    Hur, Woon-Haing
    2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,
  • [46] A masking protocol for private communication and attack detection in nonlinear observers
    Cecilia, Andreu
    Astolfi, Daniele
    Casadei, Giacomo
    Costa-Castello, Ramon
    Nesic, Dragan
    2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 7495 - 7500
  • [47] Deriving complexity information from a formal communication protocol specification
    Huang, SJ
    Lai, R
    SOFTWARE-PRACTICE & EXPERIENCE, 1998, 28 (14): : 1465 - 1491
  • [48] PROTOCOL OF MEMBERSHIP MEETING
    ZINN, WM
    ZEITSCHRIFT FUR RHEUMAFORSCHUNG, 1968, 27 (1-2): : 73 - &
  • [49] Membership Protocol Inked
    陈绍璋
    中学生英语(高中版), 2002, (02) : 21 - 21
  • [50] Credibility in Private Set Membership
    Garg, Sanjam
    Hajiabadi, Mohammad
    Jain, Abhishek
    Jin, Zhengzhong
    Pandey, Omkant
    Shiehian, Sina
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 159 - 189