Provably Secure Private Set Intersection With Constant Communication Complexity

被引:0
|
作者
Debnath, Sumit Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Math, Jamshedpur, Bihar, India
关键词
Big Data; Obfuscation; Psi; Semi-HonestAdversary; SSB Hash;
D O I
10.4018/IJCWT.2019040104
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Electronic information is increasingly shared among unreliable entities. In this context, one interesting problem involves two parties that secretly want to determine an intersection of their respective private data sets while none of them wish to disclose the whole set to the other. One can adopt a Private Set Intersection (PSI) protocol to address this problem preserving the associated security and privacy issues. In this article, the authors present the first PSI protocol that incurs constant (p(k)) communication complexity with linear computation overhead and is fast even for the case of large input sets, where p(k) is a polynomial in security parameter k. Security of this scheme is proven in the standard model against semi-honest entities. The authors combine somewhere statistically binding (SSB) hash function with indistinguishability obfuscation (iO) and space-efficient probabilistic data structure Bloom filter to design the scheme.
引用
收藏
页码:39 / 64
页数:26
相关论文
共 50 条
  • [31] An information-theoretically secure quantum multiparty private set intersection
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [32] Quantum Secure Multi-party Private Set Intersection Cardinality
    Liu, Bai
    Zhang, Mingwu
    Shi, Runhua
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 1992 - 2007
  • [33] Malicious-Secure Private Set Intersection via Dual Execution
    Rindal, Peter
    Rosulek, Mike
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1229 - 1242
  • [34] PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
    Ben-Efraim, Aner
    Nissenbaum, Olga
    Omri, Eran
    Paskin-Cherniaysky, Anat
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1098 - 1112
  • [35] Quantum Secure Multi-party Private Set Intersection Cardinality
    Bai Liu
    Mingwu Zhang
    Runhua Shi
    [J]. International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
  • [36] Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter
    Debnath, Sumit Kumar
    Dutta, Ratna
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 209 - 226
  • [37] Provably Secure Covert Communication on Blockchain
    Partala, Juha
    [J]. CRYPTOGRAPHY, 2018, 2 (03) : 1 - 18
  • [38] Combining Private Set-Intersection with Secure Two-Party Computation
    Ciampi, Michele
    Orlandi, Claudio
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 464 - 482
  • [39] New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
    Debnath, Sumit Kumar
    Dutta, Ratna
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 254 - 284
  • [40] Secure contact tracing platform from simplest private set intersection cardinality
    Gao, Jiahui
    Surana, Chetan
    Trieu, Ni
    [J]. IET INFORMATION SECURITY, 2022, 16 (05) : 346 - 361