Efficient and Secure Protocols for Privacy-Preserving Set Operations

被引:46
|
作者
Sang, Yingpeng [1 ]
Shen, Hong [1 ]
机构
[1] Univ Adelaide, Sch Comp Sci, Adelaide, SA 5005, Australia
关键词
Algorithms; Security; Bilinear groups; cryptographic protocol; noninteractive zero-knowledge argument; privacy preservation; set operations;
D O I
10.1145/1609956.1609965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications require performing set operations without publishing individual datesets. In this article, we address this problem for five fundamental set operations including set intersection, cardinality of set intersection, element reduction, overthreshold set-union, and subset relation. Our protocols are obtained in the universally composable security framework, in the assumption of the probabilistic polynomial time bounded adversary, which actively controls a fixed set of t parties and the assumption of an authenticated broadcast channel. Our constructions utilize building blocks of nonmalleable NonInteractive Zero-Knowledge (NIZK) arguments, which are based on a (t + 1, N)-threshold version (N is the number of parties in the protocol) of the boneh-goh-nissim (BGN) cryptosystem whose underlying group supports bilinear maps, in the assumption that the public key and shares of the secret key have been generated by a trusted dealer. The previous studies were all based on the stand-alone model with the same assumptions on the adversary, broadcast channel, and key generation. For the first four operations, we propose protocols that improve the previously known results by an O(N) factor in the computation and communication complexities. For the subset relation, our protocol is the first one secure against the active adversary. Our constructions of NIZK have independent interest in that, though also mentioned as building blocks, the previous work did not illustrate how to construct them. We construct these NIZK with an additional nonmalleable property, the same complexity as claimed in the previous work, and also an improvement on the communication complexity.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] Privacy-preserving set operations
    Kissner, L
    Song, D
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 241 - 257
  • [2] Privacy-preserving mixed set operations
    Wang, Wenli
    Li, Shundong
    Dou, Jiawei
    Du, Runmeng
    [J]. INFORMATION SCIENCES, 2020, 525 : 67 - 81
  • [3] Privacy-Preserving Multi-set Operations
    Huang, Meishan
    Lin, Bogang
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 713 - 719
  • [4] SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT
    Liu, Bai
    Zhang, Xiangyi
    Shi, Runhua
    Zhang, Mingwu
    Zhang, Guoxing
    [J]. MATHEMATICS, 2022, 10 (12)
  • [5] A survey on privacy-preserving authentication protocols for secure vehicular communication
    Sutradhar, Kartick
    Pillai, Beena G.
    Amin, Ruhul
    Narayan, Dayanand Lal
    [J]. COMPUTER COMMUNICATIONS, 2024, 219 : 1 - 18
  • [6] Privacy-preserving authentication protocols with efficient verification in VANETs
    Zhang, Jianhong
    Xu, Yuwei
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3676 - 3692
  • [7] A secure and efficient privacy-preserving data aggregation algorithm
    Dou, Hui
    Chen, Yuling
    Yang, Yixian
    Long, Yangyang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1495 - 1503
  • [8] A secure and efficient privacy-preserving data aggregation algorithm
    Hui Dou
    Yuling Chen
    Yixian Yang
    Yangyang Long
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1495 - 1503
  • [9] Privacy-preserving statistical computing protocols for private set intersection
    Niu, Ziyu
    Wang, Hao
    Li, Zhi
    Song, Xiangfu
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10118 - 10139
  • [10] Secure and Privacy-Preserving Consensus
    Ruan, Minghao
    Gao, Huan
    Wang, Yongqiang
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (10) : 4035 - 4049