PRIVATE SET INTERSECTION: NEW GENERIC CONSTRUCTIONS AND FEASIBILITY RESULTS

被引:3
|
作者
D'Arco, Paolo [1 ]
Gonzalez Vasco, Maria Isabel [2 ]
Perez del Pozo, Angel L. [2 ]
Soriente, Claudio [3 ]
Steinwandt, Rainer [4 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
[2] MACIMTE, Area Matemat Aplicada, U Rey Juan Carlos C Tulipan,S-N, Madrid 28933, Spain
[3] Telefon Res, Barcelona, Spain
[4] FAU, 777 Glades Rd, Boca Raton, FL 33431 USA
关键词
Private set intersection; size-hiding; unconditional security; homomorphic encryption; oblivious pseudorandom evaluation; SECURE COMPUTATION; SIZE;
D O I
10.3934/amc.2017040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we focus on protocols for private set intersection (PSI), through which two parties, each holding a set of inputs drawn from a ground set, jointly compute the intersection of their sets. Ideally, no further information than which elements are actually shared is compromised to the other party, yet the input set sizes are often considered as admissible leakage. In the unconditional setting we evidence that PSI is impossible to realize and that unconditionally secure size-hiding PSI is possible assuming a set-up authority is present in an set up phase. In the computational setting we give a generic construction using smooth projective hash functions for languages derived from perfectly-binding commitments. Further, we give two size-hiding constructions: the first one is theoretical and evidences the equivalence between PSI, oblivious transfer and the secure computation of the AND function. The second one is a twist on the oblivious polynomial evaluation construction of Freedman et al. from EUROCRYPT 2004. We further sketch a generalization of the latter using algebraic-geometric techniques. Finally, assuming again there is a set-up authority (yet not necessarily trusted) we present very simple and efficient constructions that only hide the size of the client's set.
引用
收藏
页码:481 / 502
页数:22
相关论文
共 50 条
  • [1] Private Computations on Set Intersection
    D'Arco, Paolo
    De Santis, Alfredo
    NEW ADVANCES IN DESIGNS, CODES AND CRYPTOGRAPHY, NADCC 2022, 2024, 86 : 77 - 95
  • [2] New Approach to Set Representation and Practical Private Set-Intersection Protocols
    Ruan, Ou
    Wang, Zihao
    Mi, Jing
    Zhang, Mingwu
    IEEE ACCESS, 2019, 7 : 64897 - 64906
  • [3] New approach for efficient malicious multiparty private set intersection
    Lv, Siyi
    Wei, Yu
    Jia, Jingyu
    Li, Xinhao
    Li, Tong
    Liu, Zheli
    Chen, Xiaofeng
    Guo, Liang
    INFORMATION SCIENCES, 2024, 678
  • [4] Faster Unbalanced Private Set Intersection
    Davi Resende, Amanda C.
    Aranha, Diego F.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 203 - 221
  • [5] Laconic Private Set Intersection and Applications
    Alamati, Navid
    Branco, Pedro
    Dottling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Pu, Sihang
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 94 - 125
  • [6] Efficient Threshold Private Set Intersection
    Zhang, En
    Chang, Jian
    Li, Yu
    IEEE ACCESS, 2021, 9 : 6560 - 6570
  • [7] Laconic updatable private set intersection
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [8] Efficient Robust Private Set Intersection
    Dachman-Soled, Dana
    Malkin, Tal
    Raykova, Mariana
    Yung, Moti
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 125 - 142
  • [9] Efficient private matching and set intersection
    Freedman, MJ
    Nissim, K
    Pinkas, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 1 - 19
  • [10] Intersection-policy private mutual authentication from authorized private set intersection
    Wen, Yamin
    Zhang, Fangguo
    Wang, Huaxiong
    Miao, Yinbin
    Gong, Zheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (02)