Private Set Operations from Multi-query Reverse Private Membership Test

被引:8
作者
Chen, Yu [1 ,2 ,3 ]
Zhang, Min [1 ,2 ,3 ]
Zhang, Cong [4 ]
Dong, Minglang [1 ,2 ,3 ]
Liu, Weiran [5 ]
机构
[1] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao 266237, Peoples R China
[4] Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
[5] Alibaba Grp, Hangzhou, Peoples R China
来源
PUBLIC-KEY CRYPTOGRAPHY, PT III, PKC 2024 | 2024年 / 14603卷
基金
中国国家自然科学基金;
关键词
PSO; PSU; multi-query RPMT; commutative weak PRF; permuted OPRF; SECURITY;
D O I
10.1007/978-3-031-57725-3_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set operations allow two parties to perform secure computation on their private sets, including intersection, union and functions of intersection/union. In this paper, we put forth a framework to perform private set operations. The technical core of our framework is the multi-query reverse private membership test (mqRPMT) protocol (Zhang et al., USENIX Security 2023). We present two constructions of mqRPMT from newly introduced cryptographic notions, one is based on commutative weak pseudorandom function (cwPRF), and the other is based on permuted oblivious pseudorandom function (pOPRF). Both cwPRF and pOPRF can be realized from the decisional Diffie-Hellman (DDH)-like assumptions in the random oracle model. We demonstrate the practicality of our framework with implementations. By plugging our cwPRF-based mqRPMT into the framework, we obtain various PSO protocols that are superior or competitive to the state-of-the-art protocols. For intersection functionality, our protocol is faster than the most efficient one for small sets. For cardinality functionality, our protocol achieves a 2.4 - 10.5x speedup and a 10.9 - 14.8x reduction in communication cost. For cardinality-with-sum functionality, our protocol achieves a 28.5- 76.3x speedup and 7.4x reduction in communication cost. For union functionality, our protocol is the first one that achieves strictly linear complexity, and requires the lowest concrete computation and communication costs in all settings, achieving a 2.7 - 17x speedup and about 2x reduction in communication cost. Furthermore, our improvement on PSU also translates to related functionality, yielding the most efficient private-ID protocol to date.
引用
收藏
页码:387 / 416
页数:30
相关论文
共 57 条
[1]  
Agrawal R, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[2]  
[Anonymous], About us
[3]  
[Anonymous], About us
[4]   More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries [J].
Asharov, Gilad ;
Lindell, Yehuda ;
Schneider, Thomas ;
Zohner, Michael .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :673-701
[5]  
Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207
[6]  
Bienstock A, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P301
[7]  
BONEH D., 2001, Lecture Notes Comput. Sci., V2248, P514, DOI [10.1007/3-540-45682-130, DOI 10.1007/3-540-45682-130]
[8]   Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF [J].
Chase, Melissa ;
Miao, Peihan .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III, 2020, 12172 :34-63
[9]   Labeled PSI from Fully Homomorphic Encryption with Malicious Security [J].
Chen, Hao ;
Huang, Zhicong ;
Laine, Kim ;
Rindal, Peter .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1223-1237
[10]   Fast Private Set Intersection from Homomorphic Encryption [J].
Chen, Hao ;
Laine, Kim ;
Rindal, Peter .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1243-1255