Efficient Secure Multiparty Subset Computation

被引:1
|
作者
Zhou, Sufang [1 ]
Li, Shundong [1 ]
Dou, Jiawei [2 ]
Geng, Yaling [1 ]
Liu, Xin [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China
[2] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
SET;
D O I
10.1155/2017/9717580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problemcan only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [2] An efficient simulation for quantum secure multiparty computation
    Kartick Sutradhar
    Hari Om
    Scientific Reports, 11
  • [3] Efficient Secure Multiparty Computation with Identifiable Abort
    Baum, Carsten
    Orsini, Emmanuela
    Scholl, Peter
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 461 - 490
  • [4] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [5] An efficient simulation for quantum secure multiparty computation
    Sutradhar, Kartick
    Om, Hari
    SCIENTIFIC REPORTS, 2021, 11 (01)
  • [6] Efficient Secure Multiparty Computation of the Maximum and the Minimum
    Zhang W.
    Zhang W.
    Wang X.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2023, 55 (05): : 262 - 271
  • [7] An efficient secure multiparty quantum computation protocol
    Lin Song
    Wang Ning
    Liu Xiao-Fen
    SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2023, 53 (04)
  • [8] Fair and Efficient Secure Multiparty Computation with Reputation Systems
    Asharov, Gilad
    Lindell, Yehuda
    Zarosim, Hila
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 201 - 220
  • [9] Efficient Secure Multiparty Computation Protocol in Asynchronous Network
    Huang, Zheng
    Qiu, Weidong
    Li, Qiang
    Chen, Kefei
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 152 - 158
  • [10] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96