On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12)

نویسندگان

  • Emiliano De Cristofaro
  • Gene Tsudik
چکیده

Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one PSI construct from [DT10] and reports on its optimized implementation and performance evaluation. Several key implementation choices that significantly impact real-life performance are identified and a comprehensive experimental analysis (including micro-benchmarking, with various input sizes) is presented. Finally, it is shown that our optimized implementation of this RSA-OPRF-based PSI protocol markedly outperforms the one presented in [HEK12].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Phasing: Private Set Intersection Using Permutation-based Hashing

Private Set Intersection (PSI) allows two parties to compute the intersection of private sets while revealing nothing more than the intersection itself. PSI needs to be applied to large data sets in scenarios such as measurement of ad conversion rates, data sharing, or contact discovery. Existing PSI protocols do not scale up well, and therefore some applications use insecure solutions instead....

متن کامل

Remarks on the Paper ``Coupled Fixed Point Theorems for Single-Valued Operators in b-Metric Spaces''

In this paper, we improve some recent coupled fixed point resultsfor single-valued operators in the framework of ordered $b$-metricspaces established by Bota et al. [M-F. Bota, A. Petrusel, G.Petrusel and B. Samet, Coupled fixed point theorems forsingle-valued operators in b-metric spaces, Fixed Point TheoryAppl. (2015) 2015:231]. Also, we prove that Perov-type fix...

متن کامل

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?

Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would be impractical. This paper explor...

متن کامل

Evaluation of the performance of the CMIP5 General Circulation Models in predicting the Indian Ocean Monsoon precipitation over south Sistan and Baluchestan, using the past hydrological changes in the region

1-Introduction Climate change refers to any significant change in the existing mean climatic conditions within a certain time period (Jana and Majumder, 2010; Giorgi, 2006). Earth's climate change through history has happened (Nakicenovic et al., 2000; Bytnerowicz et al., 2007). 2-Materials and methods In this study, daily precipitation and daily maximum (Tmax) and daily minimum (Tmin) tempera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012