Laconic Private Set Intersection and Applications

被引:13
|
作者
Alamati, Navid [1 ]
Branco, Pedro [2 ]
Dottling, Nico [3 ]
Garg, Sanjam [1 ,4 ]
Hajiabadi, Mohammad [5 ]
Pu, Sihang [3 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] IST Univ Lisbon, IT, Lisbon, Portugal
[3] Helmholtz Ctr Informat Secur CISPA, Saarbrucken, Germany
[4] NTT Res, Palo Alto, CA 94303 USA
[5] Univ Waterloo, Waterloo, ON, Canada
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-90456-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Consider a server with a large set S of strings {x(1), x(2) ... , x(N)} that would like to publish a small hash h of its set S such that any client with a string y can send the server a short message allowing it to learn y if y is an element of S and nothing otherwise. In this work, we study this problem of two-round private set intersection (PSI) with low (asymptotically optimal) communication cost, or what we call laconic private set intersection (lPSI) and its extensions. This problem is inspired by the recent general frameworks for laconic cryptography [Cho et al. CRYPTO 2017, Quach et al. FOCS'18]. We start by showing the first feasibility result for realizing lPSI based on the CDH assumption, or LWE with polynomial noise-to-modulus ratio. However, these feasibility results use expensive non-black-box cryptographic techniques leading to significant inefficiency. Next, with the goal of avoiding these inefficient techniques, we give a construction of lPSI schemes making only black-box use of cryptographic functions. Our construction is secure against semi-honest receivers, malicious senders and reusable in the sense that the receiver's message can be reused across any number of executions of the protocol. The scheme is secure under the phi-hiding, decisional composite residuosity and subgroup decision assumptions. Finally, we show natural applications of lPSI to realizing a semantically-secure encryption scheme that supports detection of encrypted messages belonging to a set of "illegal" messages (e.g., an illegal video) circulating online. Over the past few years, significant effort has gone into realizing laconic cryptographic protocols. Nonetheless, our work provides the first black-box constructions of such protocols for a natural application setting.
引用
收藏
页码:94 / 125
页数:32
相关论文
共 50 条
  • [41] Practical Private Set Intersection Protocols with Linear Complexity
    De Cristofaro, Emiliano
    Tsudik, Gene
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 143 - 159
  • [42] Cryptanalysis and improvement of a quantum private set intersection protocol
    Cheng, Xiaogang
    Guo, Ren
    Chen, Yonghong
    QUANTUM INFORMATION PROCESSING, 2017, 16 (02)
  • [43] Efficient Multiparty Probabilistic Threshold Private Set Intersection
    Liu, Feng-Hao
    Zhang, En
    Qin, Leiyong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2188 - 2201
  • [44] Efficient Quantum Protocol for Private Set Intersection Cardinality
    Shi, Run-Hua
    IEEE ACCESS, 2018, 6 : 73102 - 73109
  • [45] Compact and Malicious Private Set Intersection for Small Sets
    Rosulek, Mike
    Trieu, Ni
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1166 - 1181
  • [46] Fair Private Set Intersection Using Smart Contracts
    Avizheh, Sepideh
    Safavi-Naini, Reihaneh
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 74 - 104
  • [47] Fast Private Set Intersection from Homomorphic Encryption
    Chen, Hao
    Laine, Kim
    Rindal, Peter
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1243 - 1255
  • [48] An Algebraic Approach to Maliciously Secure Private Set Intersection
    Ghosh, Satrajit
    Nilges, Tobias
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 154 - 185
  • [49] Improved Private Set Intersection Against Malicious Adversaries
    Rindal, Peter
    Rosulek, Mike
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 235 - 259
  • [50] Private Multiparty Set Intersection Protocol in Rational Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 431 - 438