Private set intersection via public key encryption with keywords search

被引:10
|
作者
Shao, Zhi-Yi [1 ]
Yang, Bo [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
private set intersection; secure computation; semi-honest behavior; public key encryption with keyword search; SCHEME; SECURITY;
D O I
10.1002/sec.988
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce the public key encryption with keywords search into the problem of secure two-party computation and obtain a novel approach to accomplish private set intersection (PSI), which uses the public key encryption with keywords search as the basic tool. The public key encryption with keywords search scheme we adopt does not need the expensive MapToPoint operation, thus the computation complexity can be reduced significantly compared with other PSI schemes, which also obtain linear computation complexity. We aim to achieve PSI in computationally asymmetric settings, which can be instantiated by cloud computing. Our protocol satisfies the privacy with respect to semi-honest behavior, and the client only needs to compute m multiplications, m hashes, and one modular exponentiation to obtain the intersection, where m denotes the cardinality of the client's input set. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:396 / 402
页数:7
相关论文
共 50 条
  • [1] An efficient public key encryption with conjunctive-subset keywords search
    Zhang, Bo
    Zhang, Fangguo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 262 - 267
  • [2] Searchable Public Key Encryption Supporting Simple Boolean Keywords Search
    Zhang, Yu
    Zhao, Yansong
    Wang, Yifan
    Li, Yin
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 114 - 124
  • [3] Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method
    Zhang, Yu
    Li, Yin
    Wang, Yifan
    [J]. INFORMATION, 2018, 9 (11)
  • [4] Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption
    Fan, Cunqun
    Jia, Peiheng
    Lin, Manyun
    Wei, Lan
    Guo, Peng
    Zhao, Xiangang
    Liu, Ximeng
    [J]. MATHEMATICS, 2023, 11 (08)
  • [5] Public key authenticated encryption with multiple keywords search using Mamdani system
    Ma, Yang
    Kazemian, Hassan
    [J]. EVOLVING SYSTEMS, 2021, 12 (03) : 687 - 699
  • [6] Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search
    Song, Chenggen
    Liu, Xin
    Yan, Yalong
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 394 - 406
  • [7] Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search
    Zhang, Yu
    Wang, Yifan
    Li, Yin
    [J]. IEEE ACCESS, 2019, 7 : 122078 - 122090
  • [8] Public key authenticated encryption with multiple keywords search using Mamdani system
    Yang Ma
    Hassan Kazemian
    [J]. Evolving Systems, 2021, 12 : 687 - 699
  • [9] Private Set Intersection via Searchable Encryption against Malicious Adversaries
    Shao, Zhi-yi
    Yang, Bo
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1812 - 1819
  • [10] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896