PRIVATE SET INTERSECTION: NEW GENERIC CONSTRUCTIONS AND FEASIBILITY RESULTS

被引:3
|
作者
D'Arco, Paolo [1 ]
Gonzalez Vasco, Maria Isabel [2 ]
Perez del Pozo, Angel L. [2 ]
Soriente, Claudio [3 ]
Steinwandt, Rainer [4 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
[2] MACIMTE, Area Matemat Aplicada, U Rey Juan Carlos C Tulipan,S-N, Madrid 28933, Spain
[3] Telefon Res, Barcelona, Spain
[4] FAU, 777 Glades Rd, Boca Raton, FL 33431 USA
关键词
Private set intersection; size-hiding; unconditional security; homomorphic encryption; oblivious pseudorandom evaluation; SECURE COMPUTATION; SIZE;
D O I
10.3934/amc.2017040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we focus on protocols for private set intersection (PSI), through which two parties, each holding a set of inputs drawn from a ground set, jointly compute the intersection of their sets. Ideally, no further information than which elements are actually shared is compromised to the other party, yet the input set sizes are often considered as admissible leakage. In the unconditional setting we evidence that PSI is impossible to realize and that unconditionally secure size-hiding PSI is possible assuming a set-up authority is present in an set up phase. In the computational setting we give a generic construction using smooth projective hash functions for languages derived from perfectly-binding commitments. Further, we give two size-hiding constructions: the first one is theoretical and evidences the equivalence between PSI, oblivious transfer and the secure computation of the AND function. The second one is a twist on the oblivious polynomial evaluation construction of Freedman et al. from EUROCRYPT 2004. We further sketch a generalization of the latter using algebraic-geometric techniques. Finally, assuming again there is a set-up authority (yet not necessarily trusted) we present very simple and efficient constructions that only hide the size of the client's set.
引用
收藏
页码:481 / 502
页数:22
相关论文
共 50 条
  • [21] Distance-Aware Private Set Intersection
    Chakraborti, Anrin
    Fanti, Giulia
    Reiter, Michael K.
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 319 - 336
  • [22] Efficient and Private Set Intersection of Human Genomes
    Shen, Liyan
    Chen, Xiaojun
    Wang, Dakui
    Fang, Binxing
    Dong, Ye
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2018, : 761 - 764
  • [23] Updatable Private Set Intersection With Forward Privacy
    Wang, Ruochen
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8573 - 8586
  • [24] A Novel Quantum Protocol for Private Set Intersection
    Wen Liu
    Han-Wen Yin
    International Journal of Theoretical Physics, 2021, 60 : 2074 - 2083
  • [25] The Communication Complexity of Threshold Private Set Intersection
    Ghosh, Satrajit
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 3 - 29
  • [26] Improved Verifiable Delegated Private Set Intersection
    Terada, Shintaro
    Yoneyama, Kazuki
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 520 - 524
  • [27] Private set intersection: A systematic literature review
    Morales, Daniel
    Agudo, Isaac
    Lopez, Javier
    COMPUTER SCIENCE REVIEW, 2023, 49
  • [28] Traceable Private Set Intersection in Cloud Computing
    Jiang, Tao
    Yuan, Xu
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 81 - 87
  • [29] A Novel Quantum Protocol for Private Set Intersection
    Liu, Wen
    Yin, Han-Wen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (06) : 2074 - 2083
  • [30] Fuzzy Private Set Intersection with Large Hyperballs
    van Baarsen, Aron
    Pu, Sihang
    ADVANCES IN CRYPTOLOGY, PT V, EUROCRYPT 2024, 2024, 14655 : 340 - 369