Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries

被引:11
|
作者
Debnath, Sumit Kumar [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
关键词
PSI-CA; PSI; Semi-honest adversary; Malicious adversary; Bloom filter;
D O I
10.1007/978-3-319-26059-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study Private Set Intersection Cardinality (PSI-CA) protocols and propose two new constructions of PSI-CA. While one of these constructions is secure in the standard model, the other one is secure in the random oracle model (ROM). The security is under the Decisional Diffie-Hellman (DDH) assumption against malicious adversaries. Our proposed PSI-CA protocols are the first to achieve linear communication and computation complexities and secure against malicious adversaries. Furthermore, each of our PSI-CA constructions can be converted to PSI without losing any of the above stated properties.
引用
收藏
页码:326 / 339
页数:14
相关论文
共 50 条
  • [1] Improved Private Set Intersection Against Malicious Adversaries
    Rindal, Peter
    Rosulek, Mike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 235 - 259
  • [2] Efficient Multi-Party Private Set Intersection Against Malicious Adversaries
    Zhang, En
    Liu, Feng-Hao
    Lai, Qiqi
    Jin, Ganggang
    Li, Yu
    [J]. CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 93 - 104
  • [3] Efficient Set Operations in the Presence of Malicious Adversaries
    Carmit Hazay
    Kobbi Nissim
    [J]. Journal of Cryptology, 2012, 25 : 383 - 433
  • [4] Efficient Set Operations in the Presence of Malicious Adversaries
    Hazay, Carmit
    Nissim, Kobbi
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 383 - 433
  • [5] Efficient Set Operations in the Presence of Malicious Adversaries
    Hazay, Carmit
    Nissim, Kobbi
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 312 - +
  • [6] Private Set Intersection via Searchable Encryption against Malicious Adversaries
    Shao, Zhi-yi
    Yang, Bo
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1812 - 1819
  • [7] EMPSI: Efficient multiparty private set intersection (with cardinality)
    Yang, Yunbo
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    Li, Ruofan
    Yang, Yihao
    Dou, Shangmin
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [8] Efficient Quantum Protocol for Private Set Intersection Cardinality
    Shi, Run-Hua
    [J]. IEEE ACCESS, 2018, 6 : 73102 - 73109
  • [9] SECURE AND EFFICIENT MULTIPARTY PRIVATE SET INTERSECTION CARDINALITY
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Kundu, Nibedita
    Choudhury, Tanmay
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (02) : 365 - 386
  • [10] EMPSI: Efficient multiparty private set intersection (with cardinality)
    Yunbo Yang
    Xiaolei Dong
    Zhenfu Cao
    Jiachen Shen
    Ruofan Li
    Yihao Yang
    Shangmin Dou
    [J]. Frontiers of Computer Science, 2024, 18