Laconic Private Set Intersection and Applications

被引:13
|
作者
Alamati, Navid [1 ]
Branco, Pedro [2 ]
Dottling, Nico [3 ]
Garg, Sanjam [1 ,4 ]
Hajiabadi, Mohammad [5 ]
Pu, Sihang [3 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] IST Univ Lisbon, IT, Lisbon, Portugal
[3] Helmholtz Ctr Informat Secur CISPA, Saarbrucken, Germany
[4] NTT Res, Palo Alto, CA 94303 USA
[5] Univ Waterloo, Waterloo, ON, Canada
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-90456-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Consider a server with a large set S of strings {x(1), x(2) ... , x(N)} that would like to publish a small hash h of its set S such that any client with a string y can send the server a short message allowing it to learn y if y is an element of S and nothing otherwise. In this work, we study this problem of two-round private set intersection (PSI) with low (asymptotically optimal) communication cost, or what we call laconic private set intersection (lPSI) and its extensions. This problem is inspired by the recent general frameworks for laconic cryptography [Cho et al. CRYPTO 2017, Quach et al. FOCS'18]. We start by showing the first feasibility result for realizing lPSI based on the CDH assumption, or LWE with polynomial noise-to-modulus ratio. However, these feasibility results use expensive non-black-box cryptographic techniques leading to significant inefficiency. Next, with the goal of avoiding these inefficient techniques, we give a construction of lPSI schemes making only black-box use of cryptographic functions. Our construction is secure against semi-honest receivers, malicious senders and reusable in the sense that the receiver's message can be reused across any number of executions of the protocol. The scheme is secure under the phi-hiding, decisional composite residuosity and subgroup decision assumptions. Finally, we show natural applications of lPSI to realizing a semantically-secure encryption scheme that supports detection of encrypted messages belonging to a set of "illegal" messages (e.g., an illegal video) circulating online. Over the past few years, significant effort has gone into realizing laconic cryptographic protocols. Nonetheless, our work provides the first black-box constructions of such protocols for a natural application setting.
引用
收藏
页码:94 / 125
页数:32
相关论文
共 50 条
  • [1] Laconic updatable private set intersection
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [2] Laconic Private Set-Intersection From Pairings
    Aranha, Diego F.
    Lin, Chuanwei
    Orlandi, Claudio
    Simkin, Mark
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 111 - 124
  • [3] Cloud-Assisted Laconic Private Set Intersection Cardinality
    Wu, Axin
    Xin, Xiangjun
    Zhu, Jianhao
    Liu, Wei
    Song, Chang
    Li, Guoteng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 295 - 305
  • [4] Efficient Batched Oblivious PRF with Applications to Private Set Intersection
    Kolesnikov, Vladimir
    Kumaresan, Ranjit
    Rosulek, Mike
    Trieu, Ni
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 818 - 829
  • [5] Private Computations on Set Intersection
    D'Arco, Paolo
    De Santis, Alfredo
    NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 77 - 95
  • [6] Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching
    Garimella, Gayathri
    Rosulek, Mike
    Singh, Jaspal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 323 - 352
  • [7] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522
  • [8] Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search
    Uzun, Erkam
    Chung, Simon P.
    Kolesnikov, Vladimir
    Boldyreva, Alexandra
    Lee, Wenke
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 911 - 928
  • [9] Faster Unbalanced Private Set Intersection
    Davi Resende, Amanda C.
    Aranha, Diego F.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 203 - 221
  • [10] Efficient Threshold Private Set Intersection
    Zhang, En
    Chang, Jian
    Li, Yu
    IEEE ACCESS, 2021, 9 : 6560 - 6570