Provably Secure Private Set Intersection With Constant Communication Complexity

被引:0
|
作者
Debnath, Sumit Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Math, Jamshedpur, Bihar, India
关键词
Big Data; Obfuscation; Psi; Semi-HonestAdversary; SSB Hash;
D O I
10.4018/IJCWT.2019040104
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Electronic information is increasingly shared among unreliable entities. In this context, one interesting problem involves two parties that secretly want to determine an intersection of their respective private data sets while none of them wish to disclose the whole set to the other. One can adopt a Private Set Intersection (PSI) protocol to address this problem preserving the associated security and privacy issues. In this article, the authors present the first PSI protocol that incurs constant (p(k)) communication complexity with linear computation overhead and is fast even for the case of large input sets, where p(k) is a polynomial in security parameter k. Security of this scheme is proven in the standard model against semi-honest entities. The authors combine somewhere statistically binding (SSB) hash function with indistinguishability obfuscation (iO) and space-efficient probabilistic data structure Bloom filter to design the scheme.
引用
收藏
页码:39 / 64
页数:26
相关论文
共 50 条
  • [1] Provably Secure Contact Tracing with Conditional Private Set Intersection
    Takeshita, Jonathan
    Karl, Ryan
    Mohammed, Alamin
    Striegel, Aaron
    Jung, Taeho
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 352 - 373
  • [2] The Communication Complexity of Threshold Private Set Intersection
    Ghosh, Satrajit
    Simkin, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 3 - 29
  • [3] Secure Outsourced Private Set Intersection with Linear Complexity
    Debnath, Sumit Kumar
    Sakurai, Kouchi
    Dey, Kunal
    Kundu, Nibedita
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [4] Threshold Private Set Intersection with Better Communication Complexity
    Ghosh, Satrajit
    Simkin, Mark
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 251 - 272
  • [5] Unbalanced private set intersection with linear communication complexity
    Zhao, Quanyu
    Jiang, Bingbing
    Zhang, Yuan
    Wang, Heng
    Mao, Yunlong
    Zhong, Sheng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (03)
  • [6] Unbalanced private set intersection with linear communication complexity
    Quanyu ZHAO
    Bingbing JIANG
    Yuan ZHANG
    Heng WANG
    Yunlong MAO
    Sheng ZHONG
    [J]. Science China(Information Sciences), 2024, 67 (03) : 79 - 93
  • [7] Unbalanced private set intersection with linear communication complexity
    Quanyu Zhao
    Bingbing Jiang
    Yuan Zhang
    Heng Wang
    Yunlong Mao
    Sheng Zhong
    [J]. Science China Information Sciences, 2024, 67
  • [8] How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity
    Debnath, Sumit Kumar
    Dutta, Ratna
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 445 - 454
  • [9] Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
    De Cristofaro, Emiliano
    Kim, Jihye
    Tsudik, Gene
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 213 - +
  • [10] Linear Complexity Private Set Intersection for Secure Two-Party Protocols
    Karakoc, Ferhat
    Kupcu, Alptekin
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 409 - 429