Efficient and Secure Protocols for Privacy-Preserving Set Operations

被引:46
|
作者
Sang, Yingpeng [1 ]
Shen, Hong [1 ]
机构
[1] Univ Adelaide, Sch Comp Sci, Adelaide, SA 5005, Australia
关键词
Algorithms; Security; Bilinear groups; cryptographic protocol; noninteractive zero-knowledge argument; privacy preservation; set operations;
D O I
10.1145/1609956.1609965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications require performing set operations without publishing individual datesets. In this article, we address this problem for five fundamental set operations including set intersection, cardinality of set intersection, element reduction, overthreshold set-union, and subset relation. Our protocols are obtained in the universally composable security framework, in the assumption of the probabilistic polynomial time bounded adversary, which actively controls a fixed set of t parties and the assumption of an authenticated broadcast channel. Our constructions utilize building blocks of nonmalleable NonInteractive Zero-Knowledge (NIZK) arguments, which are based on a (t + 1, N)-threshold version (N is the number of parties in the protocol) of the boneh-goh-nissim (BGN) cryptosystem whose underlying group supports bilinear maps, in the assumption that the public key and shares of the secret key have been generated by a trusted dealer. The previous studies were all based on the stand-alone model with the same assumptions on the adversary, broadcast channel, and key generation. For the first four operations, we propose protocols that improve the previously known results by an O(N) factor in the computation and communication complexities. For the subset relation, our protocol is the first one secure against the active adversary. Our constructions of NIZK have independent interest in that, though also mentioned as building blocks, the previous work did not illustrate how to construct them. We construct these NIZK with an additional nonmalleable property, the same complexity as claimed in the previous work, and also an improvement on the communication complexity.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [22] An Efficient Authentication Scheme for Privacy-Preserving in Secure Vehicular Communications
    Zhang, Hui
    Ma, Baihe
    Guo, Yao
    Liu, Zhihong
    Zeng, Yong
    [J]. 2018 INTERNATIONAL CONFERENCE ON SENSOR NETWORKS AND SIGNAL PROCESSING (SNSP 2018), 2018, : 17 - 22
  • [23] Privacy-preserving set union
    Frikken, Keith
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 237 - 252
  • [24] Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
    Cui, Yang
    Kobara, Kazukuni
    Matsuura, Kanta
    Imai, Hideki
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 223 - +
  • [25] Verifying Indistinguishability of Privacy-Preserving Protocols
    Linvill, Kirby
    Kaki, Gowtham
    Wustrow, Eric
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [26] Towards practical privacy-preserving protocols
    Demmler, Daniel
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [27] Protocols for Privacy-Preserving DBSCAN Clustering
    Xu Wei-jiang
    Huang Liu-sheng
    Luo Yong-long
    Yao Yi-fei
    Jing Wei-wei
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 45 - 56
  • [28] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)
  • [29] EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity
    Blundo, Carlo
    De Cristofaro, Emiliano
    Gasti, Paolo
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (03) : 355 - 381
  • [30] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713