CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection

被引:0
|
作者
Luciana Marconi
Mauro Conti
Roberto Di Pietro
机构
[1] Sapienza Università di Roma,Department of Computer Science
[2] Vrije Universiteit Amsterdam,Department of Computer Science
[3] Università di Roma Tre,Department of Mathematics
关键词
Sets disjointness test; Set intersection size; Set intersection elements; Communication complexity; Privacy; Security; Probabilistic assurance;
D O I
暂无
中图分类号
学科分类号
摘要
Enforcing security often requires the two legitimate parties of a communication to determine if they share a secret, without disclosing information (e.g., the shared secret itself, or just the existence of such a secret) to third parties. In this paper, we propose CASSANDRA, a toolbox composed of three probabilistic protocols that allows two parties, each one having a subset of elements drawn by a pre-determined set, to compute information about the intersection of such two sets. In particular, C-void decides whether the two sets are disjoint; C-size allows to compute how many elements the intersection is composed of; and, C-set returns the identity of the elements of the intersection (if any). These protocols differ, other than in functionality, also in the degree of assurance they can provide and the degree of interactions required by the two parties. The communication cost also differs, but in any case, it is below the cost of competing solution representing the state of the art. These protocols also share some common features: that is, they are completely tunable and specifically suited for devices having constraints on energy, communication, storage, and bandwidth. Examples of these devices are portable devices (e.g., phones) handling satellite communications, or nodes of wireless sensor networks. Thorough analysis and extensive simulations support our findings.
引用
收藏
相关论文
共 50 条
  • [41] FREED: An Efficient Privacy-Preserving Solution for Person Re-Identification
    Zhao, Bowen
    Li, Yingjiu
    Liu, Ximeng
    Pang, Hwee Hua
    Deng, Robert H.
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [42] Private Set Intersection Protocol with Perfect Hashing on OKVS: An Enhanced Approach for Privacy-Preserving Operations
    Lee, Jiyeon
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [43] Efficient Privacy-Preserving Face Recognition
    Sadeghi, Ahmad-Reza
    Schneider, Thomas
    Wehrenberg, Immo
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 229 - 244
  • [44] Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2604 - 2618
  • [45] Privacy-Preserving Multi-set Operations
    Huang, Meishan
    Lin, Bogang
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 713 - 719
  • [46] Protocol for Privacy-Preserving Set Pattern Matching
    Zheng Qiang
    Luo Shou-shan
    Xin Yang
    Yang Yi-xian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 168 - 172
  • [48] Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks
    Koh, Jing Yang
    Leong, Derek
    Peters, Gareth W.
    Nevat, Ido
    Wong, Wai-Choong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (09) : 2105 - 2114
  • [49] Privacy-Preserving Data Aggregation with Probabilistic Range Validation
    Dekker, F. W.
    Erkin, Zekeriya
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 79 - 98
  • [50] Privacy-preserving data sharing via probabilistic modeling
    Jalko, Joonas
    Lagerspetz, Eemil
    Haukka, Jari
    Tarkoma, Sasu
    Honkela, Antti
    Kaski, Samuel
    PATTERNS, 2021, 2 (07):