Efficient Multi-Party Private Set Intersection Against Malicious Adversaries

被引:32
|
作者
Zhang, En [1 ]
Liu, Feng-Hao [2 ]
Lai, Qiqi [3 ]
Jin, Ganggang [1 ]
Li, Yu [1 ]
机构
[1] Henan Normal Univ, Xinxiang, Henan, Peoples R China
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
[3] Shaanxi Normal Univ, Xian, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
SECURE COMPUTATION;
D O I
10.1145/3338466.3358927
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Private set intersection (PSI) enables parties to compute the intersection of their inputs without leaking any additional information. Recently, there have been significant advances in the two-party settings with malicious security, making two-party PSI truly practical even compared with the naive insecure method. However, efficient PSI solutions in the more general case (multi-party) are only known for the semi-honest setting. How to construct a practical multiparty solution (especially for large inputs) in the malicious setting remains an important open question in this research line. In this work, we first present an efficient multi-party PSI protocol secure against any malicious adversary that does not simultaneously corrupt two designated parties. Next, we describe how to efficiently enhance security of the protocol when the two designated parties are corrupted. Finally, we present our experiment results for the first protocol, confirming that the efficiency scales linearly in the number of parties of the work Rindal and Rosulek (Eurocrypt 17).
引用
收藏
页码:93 / 104
页数:12
相关论文
共 50 条
  • [31] New approach for efficient malicious multiparty private set intersection
    Lv, Siyi
    Wei, Yu
    Jia, Jingyu
    Li, Xinhao
    Li, Tong
    Liu, Zheli
    Chen, Xiaofeng
    Guo, Liang
    [J]. INFORMATION SCIENCES, 2024, 678
  • [32] Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets
    Zhang, Lei
    He, Chongde
    Wei, Lifei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2286 - 2298
  • [33] Multi-party Private Set Operations with an External Decider
    Ramezanian, Sara
    Meskanen, Tommi
    Niemi, Valtteri
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 117 - 135
  • [34] Secure Multi-Party Computation of Graphs' Intersection and Union under the Malicious Model
    Liu, Xin
    Tu, Xiao-Fen
    Luo, Dan
    Xu, Gang
    Xiong, Neal N.
    Chen, Xiu-Bo
    [J]. ELECTRONICS, 2023, 12 (02)
  • [35] Post-quantum secure multi-party private set-intersection in star network topology
    Debnath, Sumit Kumar
    Choudhury, Tanmay
    Kundu, Nibedita
    Dey, Kunal
    [J]. Journal of Information Security and Applications, 2021, 58
  • [36] Post-quantum secure multi-party private set-intersection in star network topology
    Debnath, Sumit Kumar
    Choudhury, Tanmay
    Kundu, Nibedita
    Dey, Kunal
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [37] Efficient Set Operations in the Presence of Malicious Adversaries
    Carmit Hazay
    Kobbi Nissim
    [J]. Journal of Cryptology, 2012, 25 : 383 - 433
  • [38] Efficient Set Operations in the Presence of Malicious Adversaries
    Hazay, Carmit
    Nissim, Kobbi
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 383 - 433
  • [39] Efficient private multi-party numerical records matching
    Shumin Han
    Derong Shen
    Tiezheng Nie
    Yue Kou
    Ge Yu
    [J]. Frontiers of Computer Science, 2020, 14
  • [40] Multi-Party Private Set Intersection: A Circuit-Based Protocol with Jaccard Similarity for Secure and Efficient Anomaly Detection in Network Traffic
    Su, Jiuheng
    Chen, Zhili
    Yang, Xiaomin
    [J]. arXiv, 1600,