An Algebraic Approach to Maliciously Secure Private Set Intersection

被引:41
|
作者
Ghosh, Satrajit [1 ]
Nilges, Tobias [2 ]
机构
[1] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
[2] ITK Engn GmbH, Rulzheim, Germany
关键词
COMPUTATION;
D O I
10.1007/978-3-030-17659-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is an important area of research and has been the focus of many works over the past decades. It describes the problem of finding an intersection between the input sets of at least two parties without revealing anything about the input sets apart from their intersection. In this paper, we present a new approach to compute the intersection between sets based on a primitive called Oblivious Linear Function Evaluation (OLE). On an abstract level, we use this primitive to efficiently add two polynomials in a randomized way while preserving the roots of the added polynomials. Setting the roots of the input polynomials to be the elements of the input sets, this directly yields an intersection protocol with optimal asymptotic communication complexity O(m kappa). We highlight that the protocol is information-theoretically secure against a malicious adversary assuming OLE. We also present a natural generalization of the 2-party protocol for the fully malicious multi-party case. Our protocol does away with expensive (homomorphic) threshold encryption and zero-knowledge proofs. Instead, we use simple combinatorial techniques to ensure the security. As a result we get a UC-secure protocol with asymptotically optimal communication complexity O((n(2)+nm)kappa), where n is the number of parties, m is the set size and. is the security parameter. Apart from yielding an asymptotic improvement over previous works, our protocols are also conceptually simple and require only simple field arithmetic. Along the way we develop techniques that might be of independent interest.
引用
收藏
页码:154 / 185
页数:32
相关论文
共 50 条
  • [1] PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
    Ben-Efraim, Aner
    Nissenbaum, Olga
    Omri, Eran
    Paskin-Cherniaysky, Anat
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1098 - 1112
  • [2] Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
    Abadi, Aydin
    Murdoch, Steven J.
    Zacharias, Thomas
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 721 - 742
  • [3] Improved Secure Efficient Delegated Private Set Intersection
    Kavousi, Alireza
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    2020 28TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2020, : 854 - 859
  • [4] Secure Outsourced Private Set Intersection with Linear Complexity
    Debnath, Sumit Kumar
    Sakurai, Kouchi
    Dey, Kunal
    Kundu, Nibedita
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [5] Scalable and Secure Private Set Intersection for Big Data
    Hahn, Changhee
    Hur, Junbeom
    2016 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2016, : 285 - 288
  • [6] SECURE AND EFFICIENT MULTIPARTY PRIVATE SET INTERSECTION CARDINALITY
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Kundu, Nibedita
    Choudhury, Tanmay
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (02) : 365 - 386
  • [7] Malicious Secure, Structure-Aware Private Set Intersection
    Garimella, Gayathri
    Rosulek, Mike
    Singh, Jaspal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 577 - 610
  • [8] Provably Secure Contact Tracing with Conditional Private Set Intersection
    Takeshita, Jonathan
    Karl, Ryan
    Mohammed, Alamin
    Striegel, Aaron
    Jung, Taeho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 352 - 373
  • [9] Provably Secure Private Set Intersection With Constant Communication Complexity
    Debnath, Sumit Kumar
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2019, 9 (02) : 39 - 64
  • [10] Quantum Secure Disease Surveillance Through Private Set Intersection
    Sarkar, Sushmita
    Mohanty, Tapaswini
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Das, Ashok Kumar
    Park, Youngho
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 5585 - 5596