Efficient and Secure Protocols for Privacy-Preserving Set Operations

被引:46
|
作者
Sang, Yingpeng [1 ]
Shen, Hong [1 ]
机构
[1] Univ Adelaide, Sch Comp Sci, Adelaide, SA 5005, Australia
关键词
Algorithms; Security; Bilinear groups; cryptographic protocol; noninteractive zero-knowledge argument; privacy preservation; set operations;
D O I
10.1145/1609956.1609965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications require performing set operations without publishing individual datesets. In this article, we address this problem for five fundamental set operations including set intersection, cardinality of set intersection, element reduction, overthreshold set-union, and subset relation. Our protocols are obtained in the universally composable security framework, in the assumption of the probabilistic polynomial time bounded adversary, which actively controls a fixed set of t parties and the assumption of an authenticated broadcast channel. Our constructions utilize building blocks of nonmalleable NonInteractive Zero-Knowledge (NIZK) arguments, which are based on a (t + 1, N)-threshold version (N is the number of parties in the protocol) of the boneh-goh-nissim (BGN) cryptosystem whose underlying group supports bilinear maps, in the assumption that the public key and shares of the secret key have been generated by a trusted dealer. The previous studies were all based on the stand-alone model with the same assumptions on the adversary, broadcast channel, and key generation. For the first four operations, we propose protocols that improve the previously known results by an O(N) factor in the computation and communication complexities. For the subset relation, our protocol is the first one secure against the active adversary. Our constructions of NIZK have independent interest in that, though also mentioned as building blocks, the previous work did not illustrate how to construct them. We construct these NIZK with an additional nonmalleable property, the same complexity as claimed in the previous work, and also an improvement on the communication complexity.
引用
收藏
页数:35
相关论文
共 50 条
  • [41] Verifiable Privacy-Preserving Data Aggregation Protocols
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Sakai, Yusuke
    Kitagawa, Fuyuki
    Kawai, Yutaka
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 183 - 194
  • [42] CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection
    Luciana Marconi
    Mauro Conti
    Roberto Di Pietro
    [J]. International Journal of Information Security, 2011, 10
  • [43] Privacy-Preserving Communication Algorithms and Network Protocols
    Ren, Jian
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 515 - 525
  • [44] SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
    Zheng, Yandong
    Lu, Rongxing
    Zhu, Hui
    Zhang, Songnian
    Guan, Yunguo
    Shao, Jun
    Wang, Fengwei
    Li, Hui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 888 - 903
  • [45] CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection
    Marconi, Luciana
    Conti, Mauro
    Di Pietro, Roberto
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (05) : 301 - 319
  • [46] Evaluation of Two Privacy-Preserving Protocols for the DNS
    Castillo-Perez, Sergio
    Garcia-Alfaro, Joaquin
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 411 - 416
  • [47] Distributed Privacy-Preserving Iterative Summation Protocols
    Liu, Yang
    Liu, Qingchen
    Zhang, Xiong
    Qin, Shuqi
    Lei, Xiaoping
    [J]. IEEE INTELLIGENT SYSTEMS, 2020, 35 (04) : 25 - 36
  • [48] Practical Privacy-Preserving Protocols for Criminal Investigations
    Kerschbaum, Florian
    Schaad, Andreas
    Biswas, Debmalya
    [J]. ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 197 - 199
  • [49] Privacy-preserving protocols for finding the convex hulls
    Wang Qi
    Luo Yonglong
    Huang Liusheng
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 727 - 732
  • [50] Specifying and implementing privacy-preserving cryptographic protocols
    Balopoulos, Theodoros
    Gritzalis, Stefanos
    Katsikas, Sokratis K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) : 395 - 420