Laconic Private Set Intersection and Applications

被引:13
|
作者
Alamati, Navid [1 ]
Branco, Pedro [2 ]
Dottling, Nico [3 ]
Garg, Sanjam [1 ,4 ]
Hajiabadi, Mohammad [5 ]
Pu, Sihang [3 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] IST Univ Lisbon, IT, Lisbon, Portugal
[3] Helmholtz Ctr Informat Secur CISPA, Saarbrucken, Germany
[4] NTT Res, Palo Alto, CA 94303 USA
[5] Univ Waterloo, Waterloo, ON, Canada
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-90456-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Consider a server with a large set S of strings {x(1), x(2) ... , x(N)} that would like to publish a small hash h of its set S such that any client with a string y can send the server a short message allowing it to learn y if y is an element of S and nothing otherwise. In this work, we study this problem of two-round private set intersection (PSI) with low (asymptotically optimal) communication cost, or what we call laconic private set intersection (lPSI) and its extensions. This problem is inspired by the recent general frameworks for laconic cryptography [Cho et al. CRYPTO 2017, Quach et al. FOCS'18]. We start by showing the first feasibility result for realizing lPSI based on the CDH assumption, or LWE with polynomial noise-to-modulus ratio. However, these feasibility results use expensive non-black-box cryptographic techniques leading to significant inefficiency. Next, with the goal of avoiding these inefficient techniques, we give a construction of lPSI schemes making only black-box use of cryptographic functions. Our construction is secure against semi-honest receivers, malicious senders and reusable in the sense that the receiver's message can be reused across any number of executions of the protocol. The scheme is secure under the phi-hiding, decisional composite residuosity and subgroup decision assumptions. Finally, we show natural applications of lPSI to realizing a semantically-secure encryption scheme that supports detection of encrypted messages belonging to a set of "illegal" messages (e.g., an illegal video) circulating online. Over the past few years, significant effort has gone into realizing laconic cryptographic protocols. Nonetheless, our work provides the first black-box constructions of such protocols for a natural application setting.
引用
收藏
页码:94 / 125
页数:32
相关论文
共 50 条
  • [31] Private set intersection: A systematic literature review
    Morales, Daniel
    Agudo, Isaac
    Lopez, Javier
    COMPUTER SCIENCE REVIEW, 2023, 49
  • [32] Traceable Private Set Intersection in Cloud Computing
    Jiang, Tao
    Yuan, Xu
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 81 - 87
  • [33] A Novel Quantum Protocol for Private Set Intersection
    Liu, Wen
    Yin, Han-Wen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (06) : 2074 - 2083
  • [34] Fuzzy Private Set Intersection with Large Hyperballs
    van Baarsen, Aron
    Pu, Sihang
    ADVANCES IN CRYPTOLOGY, PT V, EUROCRYPT 2024, 2024, 14655 : 340 - 369
  • [35] Feasible private set intersection in quantum domain
    Sumit Kumar Debnath
    Kunal Dey
    Nibedita Kundu
    Tanmay Choudhury
    Quantum Information Processing, 2021, 20
  • [36] An efficient quantum scheme for Private Set Intersection
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    Quantum Information Processing, 2016, 15 : 363 - 371
  • [37] Optimized verifiable delegated private set intersection on outsourced private datasets
    Jiang, Guangshang
    Zhang, Hanlin
    Lin, Jie
    Kong, Fanyu
    Yu, Leyun
    COMPUTERS & SECURITY, 2024, 141
  • [38] A new efficient authorized private set intersection protocol from Schnorr signature and its applications
    Wen, Yamin
    Gong, Zheng
    Huang, Zhengan
    Qiu, Weidong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 287 - 297
  • [39] A new efficient authorized private set intersection protocol from Schnorr signature and its applications
    Yamin Wen
    Zheng Gong
    Zhengan Huang
    Weidong Qiu
    Cluster Computing, 2018, 21 : 287 - 297
  • [40] A Survey of Multi-party Private Set Intersection
    Ying, Gao
    Wei, Wang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1859 - 1872