Efficient Multi-Party Private Set Intersection Against Malicious Adversaries

被引:32
|
作者
Zhang, En [1 ]
Liu, Feng-Hao [2 ]
Lai, Qiqi [3 ]
Jin, Ganggang [1 ]
Li, Yu [1 ]
机构
[1] Henan Normal Univ, Xinxiang, Henan, Peoples R China
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
[3] Shaanxi Normal Univ, Xian, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
SECURE COMPUTATION;
D O I
10.1145/3338466.3358927
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Private set intersection (PSI) enables parties to compute the intersection of their inputs without leaking any additional information. Recently, there have been significant advances in the two-party settings with malicious security, making two-party PSI truly practical even compared with the naive insecure method. However, efficient PSI solutions in the more general case (multi-party) are only known for the semi-honest setting. How to construct a practical multiparty solution (especially for large inputs) in the malicious setting remains an important open question in this research line. In this work, we first present an efficient multi-party PSI protocol secure against any malicious adversary that does not simultaneously corrupt two designated parties. Next, we describe how to efficiently enhance security of the protocol when the two designated parties are corrupted. Finally, we present our experiment results for the first protocol, confirming that the efficiency scales linearly in the number of parties of the work Rindal and Rosulek (Eurocrypt 17).
引用
收藏
页码:93 / 104
页数:12
相关论文
共 50 条
  • [1] Improved Private Set Intersection Against Malicious Adversaries
    Rindal, Peter
    Rosulek, Mike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 235 - 259
  • [2] Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries
    Debnath, Sumit Kumar
    Dutta, Ratna
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 326 - 339
  • [3] A Survey of Multi-party Private Set Intersection
    Ying, Gao
    Wei, Wang
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1859 - 1872
  • [4] Private Set Intersection via Searchable Encryption against Malicious Adversaries
    Shao, Zhi-yi
    Yang, Bo
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1812 - 1819
  • [5] Scalable Multi-party Private Set-Intersection
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 : 175 - 203
  • [6] Practical Multi-Party Private Set Intersection Protocols
    Bay, Asli
    Erkin, Zekeriya
    Hoepman, Jaap-Henk
    Samardjiska, Simona
    Vos, Jelle
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1 - 15
  • [7] Quantum Secure Multi-party Private Set Intersection Cardinality
    Liu, Bai
    Zhang, Mingwu
    Shi, Runhua
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 1992 - 2007
  • [8] Multi-Party Private Set Intersection in Vertical Federated Learning
    Lu, Linpeng
    Ding, Ning
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 707 - 714
  • [9] Quantum Secure Multi-party Private Set Intersection Cardinality
    Bai Liu
    Mingwu Zhang
    Runhua Shi
    [J]. International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
  • [10] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522