Practical Multi-Party Private Set Intersection Protocols

نویسندگان

چکیده

Privacy-preserving techniques for processing sets of information have attracted the research community’s attention in recent years due to society’s increasing dependency on availability data at any time. One fundamental problems set operations is known as Private Set Intersection (PSI). The problem requires two parties compute intersection between their while preserving correctness and privacy. Although several efficient two-party PSI protocols already exist, multi-party setting (MPSI) currently scale poorly with a growing number parties, even though this applies many real-life scenarios. This paper fills gap by proposing based Bloom filters threshold homomorphic PKEs, which are secure semi-honest model. first protocol PSI, whereas second provides more subtle functionality - xmlns:xlink="http://www.w3.org/1999/xlink">threshold (T-MPSI) outputs items server that appear least some other private sets. inspired Davidson-Cid filters. We compare our MPSI against Kolesnikov xmlns:xlink="http://www.w3.org/1999/xlink">et al. , among fastest protocols. Our performs better than terms run time, given small there large parties. T-MPSI existing works: computational communication complexities linear elements largest fixed colluding conclude practical solutions suitable emerging use-case scenarios where previous did not well.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Private Set Intersection Protocols

The constantly increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must obtain the intersection (if one exis...

متن کامل

Scalable Multi-party Private Set-Intersection

In this work we study the problem of private set-intersection in the multi-party setting and design two protocols with the following improvements compared to prior work. First, our protocols are designed in the so-called star network topology, where a designated party communicates with everyone else, and take a new approach of leveraging the 2PC protocol of [FNP04]. This approach minimizes the ...

متن کامل

Practical Private Set Intersection Protocols with Linear Complexity

The constantly increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must obtain the intersection (if one exis...

متن کامل

Breaking and Fixing Private Set Intersection Protocols

A private set intersection protocol consists of two parties, a Sender and a Receiver, each with a secret input set. The protocol aims to have the Receiver output an intersection of the two sets while keeping the elements in the sets secret. This thesis thoroughly analyzes four recently published set intersection protocols, where it explains each protocol and checks whether it satisfies its corr...

متن کامل

Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security

In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, these ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2022

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3118879