Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

نویسندگان

  • Jung Hee Cheon
  • Stanislaw Jarecki
  • Jae Hong Seo
چکیده

Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such task could have multiple potential applications, in commerce, health-care, and security. However, all currently known secure set intersection protocols for n > 2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, rendering secure computation of set intersection impractical on anything but small datasets. In this paper we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. Specifically, our protocols require O(nkλ) bits of communication and Õ(nλ + (nλ + n)k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset and λ is security parameter. Our protocol follows the basic idea of the protocol proposed by Kissner and Song [16], but we gain efficiency by using different representation of the polynomials associated with users’ datasets, and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets

In this paper, we introduce the first protocols for multi-party, privacy-preserving, fair reconciliation of ordered sets. Our contributions are twofold. First, we show that it is possible to extend the round-based construction for fair, two-party privacypreserving reconciliation of ordered sets to multiple parties using a multi-party privacy-preserving set intersection protocol. Second, we prop...

متن کامل

Privacy-preserving Judgment of the Intersection for Convex Polygons

As the basic issues of computational geometry, intersection and union of convex polygons can solve lots of problems, such as economy and military affairs. And privacy-preserving judgment of the intersection and union for convex polygons are most popular issues for information security. Traditional method of making the polygons public does not satisfy the requirements of personal privacy. In thi...

متن کامل

Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets

When datasets are distributed on different sources, finding out matched data while preserving the privacy of the datasets is a widely required task. In this paper, we address two matching problems against the private datasets on N (N ≥ 2) parties. The first one is the Privacy Preserving Set Intersection (PPSI) problem, in which each party wants to learn the intersection of the N private dataset...

متن کامل

An Efficient and Secure Protocol for Privacy Preserving Set Intersection

When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we address the Privacy Preserving Set Intersection (PPSI) problem, in which each party learns no elements other than the intersection of the N private datasets. We propose an efficient protocol based on a threshold cryptosystem...

متن کامل

Secure Multi-Party linear Regression

Increasing efficiency in hospitals is of particular importance. Studies that combine data from multiple hospitals/data holders can tremendously improve the statistical outcome and aid in identifying efficiency markers. However, combining data from multiple sources for analysis poses privacy risks. A number of protocols have been proposed in the literature to address the privacy concerns; howeve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010