CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection

被引:0
|
作者
Luciana Marconi
Mauro Conti
Roberto Di Pietro
机构
[1] Sapienza Università di Roma,Department of Computer Science
[2] Vrije Universiteit Amsterdam,Department of Computer Science
[3] Università di Roma Tre,Department of Mathematics
关键词
Sets disjointness test; Set intersection size; Set intersection elements; Communication complexity; Privacy; Security; Probabilistic assurance;
D O I
暂无
中图分类号
学科分类号
摘要
Enforcing security often requires the two legitimate parties of a communication to determine if they share a secret, without disclosing information (e.g., the shared secret itself, or just the existence of such a secret) to third parties. In this paper, we propose CASSANDRA, a toolbox composed of three probabilistic protocols that allows two parties, each one having a subset of elements drawn by a pre-determined set, to compute information about the intersection of such two sets. In particular, C-void decides whether the two sets are disjoint; C-size allows to compute how many elements the intersection is composed of; and, C-set returns the identity of the elements of the intersection (if any). These protocols differ, other than in functionality, also in the degree of assurance they can provide and the degree of interactions required by the two parties. The communication cost also differs, but in any case, it is below the cost of competing solution representing the state of the art. These protocols also share some common features: that is, they are completely tunable and specifically suited for devices having constraints on energy, communication, storage, and bandwidth. Examples of these devices are portable devices (e.g., phones) handling satellite communications, or nodes of wireless sensor networks. Thorough analysis and extensive simulations support our findings.
引用
收藏
相关论文
共 50 条
  • [31] Achieving privacy-preserving sensitive attributes for large universe based on private set intersection
    Yang, Li
    Li, Cheng
    Cheng, Yuting
    Yu, Shui
    Ma, Jianfeng
    INFORMATION SCIENCES, 2022, 582 : 529 - 546
  • [32] SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
    Zheng, Yandong
    Lu, Rongxing
    Zhu, Hui
    Zhang, Songnian
    Guan, Yunguo
    Shao, Jun
    Wang, Fengwei
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 888 - 903
  • [33] Privacy-Preserving Ridesharing via Probabilistic Matching
    Ma, Tianye
    Dong, Yukun
    Hu, Yidan
    Zhang, Rui
    2024 IEEE/ACM 32ND INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE, IWQOS, 2024,
  • [34] Privacy-preserving edge caching: A probabilistic approach
    Hassanpour, Seyedeh Bahereh
    Khonsari, Ahmad
    Moradian, Masoumeh
    Shariatpanahi, Seyed Pooya
    COMPUTER NETWORKS, 2023, 226
  • [35] Privacy-Preserving Distributed Probabilistic Load Flow
    Jia, Mengshuo
    Wang, Yi
    Shen, Chen
    Hug, Gabriela
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (02) : 1616 - 1627
  • [36] Lifting in Support of Privacy-Preserving Probabilistic Inference
    Gehrke, Marcel
    Liebenow, Johannes
    Mohammadi, Esfandiar
    Braun, Tanya
    KUNSTLICHE INTELLIGENZ, 2024, 38 (03): : 225 - 241
  • [37] A Privacy-Preserving Symptoms Retrieval System with the Aid of Homomorphic Encryption and Private Set Intersection Schemes
    Wang, Yi-Wei
    Wu, Ja-Ling
    ALGORITHMS, 2023, 16 (05)
  • [38] An Efficient Privacy-Preserving Comparison Protocol
    Saha, Tushar Kanti
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 553 - 565
  • [39] Efficient Privacy-Preserving Link Discovery
    He, Xiaoyun
    Vaidya, Jaideep
    Shafiq, Basit
    Adam, Nabil
    Terzi, Evimaria
    Grandison, Tyrone
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, 5476 : 16 - +
  • [40] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23