Efficient and Secure Protocols for Privacy-Preserving Set Operations

被引:46
|
作者
Sang, Yingpeng [1 ]
Shen, Hong [1 ]
机构
[1] Univ Adelaide, Sch Comp Sci, Adelaide, SA 5005, Australia
关键词
Algorithms; Security; Bilinear groups; cryptographic protocol; noninteractive zero-knowledge argument; privacy preservation; set operations;
D O I
10.1145/1609956.1609965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications require performing set operations without publishing individual datesets. In this article, we address this problem for five fundamental set operations including set intersection, cardinality of set intersection, element reduction, overthreshold set-union, and subset relation. Our protocols are obtained in the universally composable security framework, in the assumption of the probabilistic polynomial time bounded adversary, which actively controls a fixed set of t parties and the assumption of an authenticated broadcast channel. Our constructions utilize building blocks of nonmalleable NonInteractive Zero-Knowledge (NIZK) arguments, which are based on a (t + 1, N)-threshold version (N is the number of parties in the protocol) of the boneh-goh-nissim (BGN) cryptosystem whose underlying group supports bilinear maps, in the assumption that the public key and shares of the secret key have been generated by a trusted dealer. The previous studies were all based on the stand-alone model with the same assumptions on the adversary, broadcast channel, and key generation. For the first four operations, we propose protocols that improve the previously known results by an O(N) factor in the computation and communication complexities. For the subset relation, our protocol is the first one secure against the active adversary. Our constructions of NIZK have independent interest in that, though also mentioned as building blocks, the previous work did not illustrate how to construct them. We construct these NIZK with an additional nonmalleable property, the same complexity as claimed in the previous work, and also an improvement on the communication complexity.
引用
收藏
页数:35
相关论文
共 50 条
  • [31] Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities
    Bouchelagherm, Siham
    Omar, Mawloud
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 82 (82)
  • [32] Secure and efficient vehicle data downloading scheme with privacy-preserving in VANETs
    Cao, Chengliang
    Wang, Fenghe
    Xiao, Han
    Wang, Ye
    [J]. COMPUTER NETWORKS, 2024, 250
  • [33] Secure Dataset Condensation for Privacy-Preserving and Efficient Vertical Federated Learning
    Gao, Dashan
    Wu, Canhui
    Zhang, Xiaojin
    Yao, Xin
    Yang, Qiang
    [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES: RESEARCH TRACK, PT I, ECML PKDD 2024, 2024, 14941 : 212 - 229
  • [34] Lightweight privacy-preserving authentication protocols secure against active attack in an asymmetric way
    Cui, Yang
    Kobara, Kazukuni
    Matsuura, Kanta
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05): : 1457 - 1465
  • [35] Secure Privacy-Preserving Protocols for Outsourcing Continuous Authentication of Smartphone Users with Touch Data
    Govindarajan, Sathya
    Gasti, Paolo
    Balagani, Kiran S.
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [36] Privacy-preserving data set union
    Segre, Alberto Maria
    Wildenberg, Andrew
    Vieland, Veronica
    Zhang, Ying
    [J]. PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2006, 4302 : 266 - +
  • [37] TrInc-based Secure and Privacy-preserving Protocols for Vehicular Ad Hoc Networks
    Wei, Lingbo
    Zhang, Chi
    [J]. 2016 IEEE 83RD VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2016,
  • [38] Privacy-preserving distributed set intersection
    Ye, Qingsong
    Wang, Huaxiong
    Tartary, Christophe
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1332 - +
  • [39] Verifiable Privacy-Preserving Data Aggregation Protocols
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Sakai, Yusuke
    Kitagawa, Fuyuki
    Kawai, Yutaka
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 183 - 194
  • [40] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122