Efficient Secure Multiparty Subset Computation

被引:1
|
作者
Zhou, Sufang [1 ]
Li, Shundong [1 ]
Dou, Jiawei [2 ]
Geng, Yaling [1 ]
Liu, Xin [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China
[2] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
SET;
D O I
10.1155/2017/9717580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problemcan only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [42] Practical applications of secure multiparty computation
    Talviste, Riivo
    Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [43] Secure multiparty computation in cloud computing
    Jiang H.
    Xu Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [44] Basic constructions of secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    Kamm, Liina
    Veeningen, Meilof
    Cryptology and Information Security Series, 2015, 13 : 1 - 25
  • [45] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [46] Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
    Guo, Chun
    Katz, Jonathan
    Wang, Xiao
    Yu, Yu
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 825 - 841
  • [47] Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
    Eriguchi, Reo
    Ichikawa, Atsunori
    Kunihiro, Noboru
    Nuida, Koji
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 271 - 290
  • [48] Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel
    Sun, Yi
    Wen, Qiaoyan
    Zhang, Yudong
    Zhang, Hua
    Jin, Zhengping
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [49] Generalizing Efficient Multiparty Computation
    David, Bernardo M.
    Nishimaki, Ryo
    Ranellucci, Samuel
    Tapp, Alain
    INFORMATION THEORETIC SECURITY (ICITS 2015), 2015, 9063 : 15 - 32
  • [50] A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
    Toft, Tomas
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 20 - 33