A Survey of Multi-party Private Set Intersection

被引:1
作者
Ying, Gao [1 ,2 ,3 ]
Wei, Wang [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Zhongguancun Lab, Beijing 100094, Peoples R China
[3] Minist Ind & Informat Technol, Key Lab Aerosp Network Secur, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Private Set Intersection (PSI); Oblivious Transfer (OT); Oblivious pseudorandom function; Additively homomorphic encryption; Zero secret sharing; SECURE;
D O I
10.11999/JEIT220664
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of new technologies, such as the Internet and big data, more and more distributed data need to be processed by multiple parties. Therefore, privacy protection technology is facing greater challenges. Secure multi-party computation is an important privacy protection technology, which can provide solutions for the secure and efficient sharing of data. As an important branch of secure multi-party computation, Private Set Intersection (PSI) technology can calculate the intersection of private data sets of two or more participants under the premise of protecting the data privacy of participants. It can be divided into two-party PSI and multi-party PSI according to the number of participants. With the expansion of private data sharing scale, application scenarios with more than two participants are more and more common. Multi party PSI has the same technical basis as the two party PSI, but has essential differences. Firstly, the research progress of the two-party PSI is discussed. Then the development processes of multi-party PSI are analyzed in detail. The multi-party PSI is divided into traditional multi-party PSI and threshold multi-party PSI according to the different scenarios. At the same time, protocols in different scenarios are divided more carefully according to the different basic cryptographic protocols they used and their different functions. The typical protocols are analyzed, and the cryptographic protocols, security model, computation and communication complexity of the protocols are discussed. Finally, the research hotspots and future development directions of multi-party PSI are pointed out.
引用
收藏
页码:1859 / 1872
页数:14
相关论文
共 90 条
  • [1] Multi-party Updatable Delegated Private Set Intersection
    Abadi, Aydin
    Dong, Changyu
    Murdoch, Steven J.
    Terzis, Sotirios
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2022, 2022, 13411 : 100 - 119
  • [2] ABADI A, 20 INT C FIN CRYPT D
  • [3] Efficient Delegated Private Set Intersection on Outsourced Private Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Metere, Roberto
    Dong, Changyu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 608 - 624
  • [4] O-PSI: Delegated Private Set Intersection on Outsourced Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Dong, Changyu
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 3 - 17
  • [5] [Anonymous], 2021, ITS PRIA, V48, P301, DOI [10.11896/jsjkx.210300308, DOI 10.11896/JSJKX.210300308]
  • [6] Badrinarayanan S, 2021, LECT NOTES COMPUT SC, V12711, P349, DOI 10.1007/978-3-030-75248-4_13
  • [7] Practical Multi-Party Private Set Intersection Protocols
    Bay, Asli
    Erkin, Zekeriya
    Hoepman, Jaap-Henk
    Samardjiska, Simona
    Vos, Jelle
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1 - 15
  • [8] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522
  • [9] PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
    Ben-Efraim, Aner
    Nissenbaum, Olga
    Omri, Eran
    Paskin-Cherniaysky, Anat
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1098 - 1112
  • [10] Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
    Boneh, Dan
    Gennaro, Rosario
    Goldfeder, Steven
    Jain, Aayush
    Kim, Sam
    Rasmussen, Peter M. R.
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 565 - 596