Private Set Intersection via Searchable Encryption against Malicious Adversaries

被引:0
|
作者
Shao, Zhi-yi [1 ]
Yang, Bo [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
关键词
Private set intersection; Secure computation; Malicious adversary; Simulation based security; Searchable encryption;
D O I
10.4028/www.scientific.net/AMR.1049-1050.1812
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Shao et al. proposed a novel method for computing private set intersection based on searchable encryption. Compared with the traditional protocols, their technique requires much less computation for the client to obtain the intersection. Concretely, the client only computes m (the cardinality of the client's input set) multiplications, m hashes, and one modular exponentiation. However, their protocol only satisfies security against semi-honest behaviors. In this paper, we aim to promote the security of Shao et al.'s protocol. Our solution woks in the CRS model, and is based on the non-interactive zero knowledge proof and the succinct non-interactive argument. The proposed protocol satisfies security against malicious adversaries and needs only one round interaction.
引用
收藏
页码:1812 / 1819
页数:8
相关论文
共 50 条
  • [1] Improved Private Set Intersection Against Malicious Adversaries
    Rindal, Peter
    Rosulek, Mike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 235 - 259
  • [2] Efficient Multi-Party Private Set Intersection Against Malicious Adversaries
    Zhang, En
    Liu, Feng-Hao
    Lai, Qiqi
    Jin, Ganggang
    Li, Yu
    [J]. CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 93 - 104
  • [3] Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries
    Debnath, Sumit Kumar
    Dutta, Ratna
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 326 - 339
  • [4] Multi-keyword Searchable Encryption Based on Paillier and Private Set Intersection
    Zhou, Fu-Cai
    Zhang, Zong-Ye
    Wang, Kai-Xuan
    Li, Yu-Xi
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (03): : 321 - 326
  • [5] Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    Hazay, Carmit
    Lindell, Yehuda
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (03) : 422 - 456
  • [6] Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    Hazay, Carmit
    Lindell, Yehuda
    [J]. THEORY OF CRYPTOGRAPHY, 2008, 4948 : 155 - 175
  • [7] Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    Carmit Hazay
    Yehuda Lindell
    [J]. Journal of Cryptology, 2010, 23 : 422 - 456
  • [8] Malicious-Secure Private Set Intersection via Dual Execution
    Rindal, Peter
    Rosulek, Mike
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1229 - 1242
  • [9] Private set intersection via public key encryption with keywords search
    Shao, Zhi-Yi
    Yang, Bo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 396 - 402
  • [10] Practical and malicious private set intersection with improved efficiency
    Zhu, Yizhao
    Chen, Lanxiang
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2024, 991