Practical and Malicious Multiparty Private Set Intersection for Small Sets

被引:0
|
作者
Zhou, Ji [1 ]
Liu, Zhusen [2 ]
Wang, Luyao [1 ]
Zhao, Chuan [3 ]
Liu, Zhe [1 ]
Zhou, Lu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Zhejiang Lab, Res Inst Basic Theories, Res Ctr Basic Theories Intelligent Comp, Hangzhou 311500, Peoples R China
[3] Quan Cheng Lab, Jinan 250103, Peoples R China
基金
国家重点研发计划;
关键词
multiparty private set intersection; small sets; gabled cuckoo table; PROTOCOLS;
D O I
10.3390/electronics12234851
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is a pivotal subject in the realm of privacy computation. Numerous research endeavors have concentrated on situations involving vast and imbalanced sets. Nevertheless, there is a scarcity of existing PSI protocols tailored for small sets. Those that exist are either restricted to interactions between two parties or necessitate resource-intensive homomorphic operations. To bring forth practical multiparty private set intersection solutions for small sets, we present two multiparty PSI protocols founded on the principles of Oblivious Key-Value Stores (OKVSs), polynomials, and gabled cuckoo tables. Our security analysis underscores the resilience of these protocols against malicious models and collision attacks. Through experimental evaluations, we establish that, in comparison to related endeavors, our protocols excel in small-set contexts, particularly in low-bandwidth wide area network (WAN) settings.
引用
下载
收藏
页数:21
相关论文
共 50 条
  • [1] Compact and Malicious Private Set Intersection for Small Sets
    Rosulek, Mike
    Trieu, Ni
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1166 - 1181
  • [2] Simple, Fast Malicious Multiparty Private Set Intersection
    Nevo, Ofri
    Trieu, Ni
    Yanai, Avishay
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1151 - 1165
  • [3] New approach for efficient malicious multiparty private set intersection
    Lv, Siyi
    Wei, Yu
    Jia, Jingyu
    Li, Xinhao
    Li, Tong
    Liu, Zheli
    Chen, Xiaofeng
    Guo, Liang
    INFORMATION SCIENCES, 2024, 678
  • [4] Practical and malicious private set intersection with improved efficiency
    Zhu, Yizhao
    Chen, Lanxiang
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2024, 991
  • [5] PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
    Ben-Efraim, Aner
    Nissenbaum, Olga
    Omri, Eran
    Paskin-Cherniaysky, Anat
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1098 - 1112
  • [6] Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets
    Zhang L.
    He C.
    Wei L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2286 - 2298
  • [7] Improved Private Set Intersection for Sets with Small Entries
    Bui, Dung
    Couteau, Geoffroy
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 190 - 220
  • [8] A Practical Multiparty Private Set Intersection Protocol Based on Bloom Filters for Unbalanced Scenarios
    Ruan, Ou
    Yan, Changwang
    Zhou, Jing
    Ai, Chaohao
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [9] Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection
    Miyaji A.
    Nakasho K.
    Nishida S.
    Journal of Medical Systems, 2017, 41 (3)
  • [10] Efficient Multiparty Probabilistic Threshold Private Set Intersection
    Liu, Feng-Hao
    Zhang, En
    Qin, Leiyong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2188 - 2201