Secure and efficient multiparty private set intersection cardinality
نویسندگان
چکیده
In the field of privacy preserving protocols, Private Set Intersection (PSI) plays an important role. In most cases, PSI allows two parties to securely determine intersection their private input sets, and no other information. this paper, employing a Bloom filter, we propose Multiparty Cardinality (MPSI-CA), where number participants in is not limited two. The security our scheme achieved standard model under Decisional Diffie-Hellman (DDH) assumption against semi-honest adversaries. Our flexible sense that set size one participant independent from others. We consider modular exponentiations order computational complexity. construction, communication computation overheads each \begin{document}$ O(v_{\sf max}k) $\end{document} except complexity designated party id="M2">\begin{document}$ O(v_1) $\end{document}, id="M3">\begin{document}$ v_{\sf max} maximum size, id="M4">\begin{document}$ v_1 denotes id="M5">\begin{document}$ k parameter. Particularly, MSPI-CA first incurs linear terms namely id="M6">\begin{document}$ O(nv_{\sf id="M7">\begin{document}$ n participants. Further, extend MPSI-CA MPSI retaining all attributes properties. As far as are aware of, there so individual cost Unlike MPSI-CA, does require any kind broadcast channel it uses star network topology communicates with everyone else.
منابع مشابه
Unconditionally Secure Multiparty Set Intersection Re-Visited
In this paper, we re-visit the problem of unconditionally secure multiparty set intersection in information theoretic model. Li et.al [24] have proposed a protocol for n-party set intersection problem, which provides unconditional security when t < n 3 players are corrupted by an active adversary having unbounded computing power. Moreover, they have claimed that their protocol takes six rounds ...
متن کاملEfficient Robust Private Set Intersection
Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first so...
متن کاملEfficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. We present protocols, based on the use of homomorphic encryption and balanced hashing, for both semi-honest and malicious environments. For lists of length k, we obtain O(k) ...
متن کاملRound Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
In information theoretic model, unconditionally secure multiparty computation (UMPC) allows a set of n parties to securely compute an agreed function f , even upto t < n/2 parties are under the control of an active adversary having unbounded computing power. The bound on the resilience/fault tolerance (i.e t < n/2 ) is optimal, as long as each party is connected with every other party by a secu...
متن کاملSecure set intersection cardinality with application to association rule mining
There has been concern over the apparent conflict between privacy and data mining. There is no inherent conflict, as most types of data mining produce summary results that do not reveal information about individuals. The process of data mining may use private data, leading to the potential for privacy breaches. Secure Multiparty Computation shows that results can be produced without revealing t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics of Communications
سال: 2021
ISSN: ['1930-5346', '1930-5338']
DOI: https://doi.org/10.3934/amc.2020071