Traceable Private Set Intersection in Cloud Computing

被引:0
|
作者
Jiang, Tao [1 ]
Yuan, Xu [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[2] Univ Louisiana Lafayette, Sch Comp & Informat, Lafayette, LA 70504 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; private set intersection; traceability; bit commitment; garbled Bloom filter; EFFICIENT PROTOCOLS; SECURITY;
D O I
10.1109/dsc47296.2019.8937666
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Private set intersection (PSI) is a fundamental primitive of many secure applications, which is broadly attracting researchers' interests. The most of existing private set intersection solutions are constructed based on the designed garbled Bloom filter to prevent against the semi-honest adversary. However, the security attributes can no longer be hold in the presence of the malicious adversary. In this paper, we present a novel traceable PSI protocol to protect the confidentiality of the participants in the presence of the malicious adversary, when operating on the large-scale data set. Specifically, our scheme relies on the committed Bloom filter, committed random selection and ownership proof, which enables clients and the cloud server to conduct secure and fine-grained verification through randomly checking a small fraction of clients' data items. To further reduce the communication and computation overhead, a probabilistic approach is developed to provide efficient verification. In the end, we conduct security analysis of our scheme and prove that it is secure under the full universe attack.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [1] An Efficient Private Set Intersection Protocol for the Cloud Computing Environments
    Ruan, Ou
    Huang, Xiongbo
    Mao, Hao
    [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 254 - 259
  • [2] Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
    Hu, Jingwei
    Zhao, Yongjun
    Tan, Benjamin Hong Meng
    Aung, Khin Mi Mi
    Wang, Huaxiong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6184 - 6196
  • [3] Private Set Intersection with Delegated Blind Quantum Computing
    Amoretti, Michele
    [J]. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [4] Cloud-Assisted Laconic Private Set Intersection Cardinality
    Wu, Axin
    Xin, Xiangjun
    Zhu, Jianhao
    Liu, Wei
    Song, Chang
    Li, Guoteng
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 295 - 305
  • [5] Privacy-preserving statistical computing protocols for private set intersection
    Niu, Ziyu
    Wang, Hao
    Li, Zhi
    Song, Xiangfu
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10118 - 10139
  • [6] Private Computations on Set Intersection
    D'Arco, Paolo
    De Santis, Alfredo
    [J]. NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 77 - 95
  • [7] Faster Unbalanced Private Set Intersection
    Davi Resende, Amanda C.
    Aranha, Diego F.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 203 - 221
  • [8] Laconic Private Set Intersection and Applications
    Alamati, Navid
    Branco, Pedro
    Dottling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Pu, Sihang
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 94 - 125
  • [9] Efficient Threshold Private Set Intersection
    Zhang, En
    Chang, Jian
    Li, Yu
    [J]. IEEE ACCESS, 2021, 9 : 6560 - 6570
  • [10] Efficient private matching and set intersection
    Freedman, MJ
    Nissim, K
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 1 - 19