Laconic Private Set Intersection and Applications

被引:13
|
作者
Alamati, Navid [1 ]
Branco, Pedro [2 ]
Dottling, Nico [3 ]
Garg, Sanjam [1 ,4 ]
Hajiabadi, Mohammad [5 ]
Pu, Sihang [3 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] IST Univ Lisbon, IT, Lisbon, Portugal
[3] Helmholtz Ctr Informat Secur CISPA, Saarbrucken, Germany
[4] NTT Res, Palo Alto, CA 94303 USA
[5] Univ Waterloo, Waterloo, ON, Canada
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-90456-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Consider a server with a large set S of strings {x(1), x(2) ... , x(N)} that would like to publish a small hash h of its set S such that any client with a string y can send the server a short message allowing it to learn y if y is an element of S and nothing otherwise. In this work, we study this problem of two-round private set intersection (PSI) with low (asymptotically optimal) communication cost, or what we call laconic private set intersection (lPSI) and its extensions. This problem is inspired by the recent general frameworks for laconic cryptography [Cho et al. CRYPTO 2017, Quach et al. FOCS'18]. We start by showing the first feasibility result for realizing lPSI based on the CDH assumption, or LWE with polynomial noise-to-modulus ratio. However, these feasibility results use expensive non-black-box cryptographic techniques leading to significant inefficiency. Next, with the goal of avoiding these inefficient techniques, we give a construction of lPSI schemes making only black-box use of cryptographic functions. Our construction is secure against semi-honest receivers, malicious senders and reusable in the sense that the receiver's message can be reused across any number of executions of the protocol. The scheme is secure under the phi-hiding, decisional composite residuosity and subgroup decision assumptions. Finally, we show natural applications of lPSI to realizing a semantically-secure encryption scheme that supports detection of encrypted messages belonging to a set of "illegal" messages (e.g., an illegal video) circulating online. Over the past few years, significant effort has gone into realizing laconic cryptographic protocols. Nonetheless, our work provides the first black-box constructions of such protocols for a natural application setting.
引用
收藏
页码:94 / 125
页数:32
相关论文
共 50 条
  • [21] Feasible private set intersection in quantum domain
    Debnath, Sumit Kumar
    Dey, Kunal
    Kundu, Nibedita
    Choudhury, Tanmay
    QUANTUM INFORMATION PROCESSING, 2021, 20 (01)
  • [22] Federated K-Private Set Intersection
    Elkordy, Ahmed Roushdy
    Ezzeldin, Yahya H.
    Avestimehr, Salman
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 436 - 445
  • [23] Topgun: An ECC Accelerator for Private Set Intersection
    Wu, Guiming
    He, Qianwen
    Jiang, Jiali
    Zhang, Zhenxiang
    Zhao, Yuan
    Zou, Yinchao
    Zhang, Jie
    Wei, Changzheng
    Yan, Ying
    Zhang, Hui
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2023, 16 (04)
  • [24] Predicate Private Set Intersection with Linear Complexity
    Yang, Yaxi
    Weng, Jian
    Yi, Yufeng
    Dong, Changyu
    Zhang, Leo Yu
    Zhou, Jianying
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 143 - 166
  • [25] Distance-Aware Private Set Intersection
    Chakraborti, Anrin
    Fanti, Giulia
    Reiter, Michael K.
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 319 - 336
  • [26] Efficient and Private Set Intersection of Human Genomes
    Shen, Liyan
    Chen, Xiaojun
    Wang, Dakui
    Fang, Binxing
    Dong, Ye
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2018, : 761 - 764
  • [27] Updatable Private Set Intersection With Forward Privacy
    Wang, Ruochen
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8573 - 8586
  • [28] A Novel Quantum Protocol for Private Set Intersection
    Wen Liu
    Han-Wen Yin
    International Journal of Theoretical Physics, 2021, 60 : 2074 - 2083
  • [29] The Communication Complexity of Threshold Private Set Intersection
    Ghosh, Satrajit
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 3 - 29
  • [30] Improved Verifiable Delegated Private Set Intersection
    Terada, Shintaro
    Yoneyama, Kazuki
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 520 - 524