CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection

被引:0
|
作者
Luciana Marconi
Mauro Conti
Roberto Di Pietro
机构
[1] Sapienza Università di Roma,Department of Computer Science
[2] Vrije Universiteit Amsterdam,Department of Computer Science
[3] Università di Roma Tre,Department of Mathematics
关键词
Sets disjointness test; Set intersection size; Set intersection elements; Communication complexity; Privacy; Security; Probabilistic assurance;
D O I
暂无
中图分类号
学科分类号
摘要
Enforcing security often requires the two legitimate parties of a communication to determine if they share a secret, without disclosing information (e.g., the shared secret itself, or just the existence of such a secret) to third parties. In this paper, we propose CASSANDRA, a toolbox composed of three probabilistic protocols that allows two parties, each one having a subset of elements drawn by a pre-determined set, to compute information about the intersection of such two sets. In particular, C-void decides whether the two sets are disjoint; C-size allows to compute how many elements the intersection is composed of; and, C-set returns the identity of the elements of the intersection (if any). These protocols differ, other than in functionality, also in the degree of assurance they can provide and the degree of interactions required by the two parties. The communication cost also differs, but in any case, it is below the cost of competing solution representing the state of the art. These protocols also share some common features: that is, they are completely tunable and specifically suited for devices having constraints on energy, communication, storage, and bandwidth. Examples of these devices are portable devices (e.g., phones) handling satellite communications, or nodes of wireless sensor networks. Thorough analysis and extensive simulations support our findings.
引用
收藏
相关论文
共 50 条
  • [1] CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection
    Marconi, Luciana
    Conti, Mauro
    Di Pietro, Roberto
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (05) : 301 - 319
  • [2] Privacy-preserving distributed set intersection
    Ye, Qingsong
    Wang, Huaxiong
    Tartary, Christophe
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1332 - +
  • [3] SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT
    Liu, Bai
    Zhang, Xiangyi
    Shi, Runhua
    Zhang, Mingwu
    Zhang, Guoxing
    MATHEMATICS, 2022, 10 (12)
  • [4] Privacy-preserving statistical computing protocols for private set intersection
    Niu, Ziyu
    Wang, Hao
    Li, Zhi
    Song, Xiangfu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10118 - 10139
  • [5] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [6] Efficient and Secure Protocols for Privacy-Preserving Set Operations
    Sang, Yingpeng
    Shen, Hong
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [7] Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
    Eskeland, Sigurd
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2024, 18 (01)
  • [8] Non-interactive set intersection for privacy-preserving contact tracing
    Wu, Axin
    Yang, Yuer
    Wen, Jinghang
    Zhang, Yu
    Zhao, Qiuxia
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 158
  • [9] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [10] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286