Private and Threshold Set-Intersection

ثبت نشده
چکیده

In this paper we consider the problem of privately computing the set-intersection (private matching) of sets, as well as several variations on this problem: cardinality set-intersection, threshold set-intersection, and over-threshold set-intersection. Cardinality set-intersection is the problem of determining the size of the intersection set, without revealing the actual set. In threshold set-intersection, only the elements which appear at least a threshold number t times in the players’ private inputs are revealed. Over-threshold setintersection is a variation on threshold set-intersection in which not only the threshold set is revealed, but also the popularity of each element in the set. Let there be n ≥ 2 players, c < n dishonestly colluding, each with a private input set of k elements. Our protocols for two parties are comparable to those of Freedman, Nissim, and Pinkas [12], except in the malicious case, in which we achieve security without the use of the expensive cut-and-choose technique. Freedman, Nissim, and Pinkas also address the problem of private set-intersection for multiple parties, giving a protocol secure against honest-but-curious parties with O(nk) total communication complexity, but no protocol secure against malicious adversaries. We give a protocol for this scenario secure against honest-but-curious parties with O(cnk) total communication complexity, and against malicious parties with communication complexity O(nk). There was no previous efficient protocol for the problems of cardinality set-intersection (for n ≥ 3 players or n ≥ 2 malicious players), threshold set-intersection, or over-threshold set-intersection. We give the first efficient protocols for these problems without generic secure circuit computation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Private and threshold set-intersection

In this paper we consider the problem of privately computing the intersection of sets (setintersection), as well as several variations on this problem: cardinality set-intersection, threshold set-intersection, and over-threshold set-intersection. Cardinality set-intersection is the problem of determining the size of the intersection set, without revealing the actual threshold set. In threshold ...

متن کامل

Fast Private Set Operations with SEPIA

Private set operations allow correlation of sensitive data from multiple data owners. Although intensely researched, current solutions still exhibit limited scalability in terms of the supported maximum set size and number of sets. To address these issues, we propose a new approach to private set operations based on a combination of efficient secure multiparty computation and bloom filters, a s...

متن کامل

An Efficient and Secure Protocol for Privacy Preserving Set Intersection

When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we address the Privacy Preserving Set Intersection (PPSI) problem, in which each party learns no elements other than the intersection of the N private datasets. We propose an efficient protocol based on a threshold cryptosystem...

متن کامل

An Algebraic Approach to Maliciously Secure Private Set Intersection

Private set intersection is an important area of research and has been the focus of many works over the past decades. It describes the problem of finding an intersection between the input sets of at least two parties without revealing anything about the input sets apart from their intersection. In this paper, we present a new approach to compute the intersection between sets based on a primitiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004