O-PSI: Delegated Private Set Intersection on Outsourced Datasets

被引:49
作者
Abadi, Aydin [1 ]
Terzis, Sotirios [1 ]
Dong, Changyu [1 ]
机构
[1] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow, Lanark, Scotland
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION | 2015年 / 455卷
关键词
SECURE;
D O I
10.1007/978-3-319-18467-8_1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) has a wide range of applications such as privacy-preserving data mining. With the advent of cloud computing it is now desirable to take advantage of the storage and computation capabilities of the cloud to outsource datasets and delegate PSI computation. In this paper we design O-PSI, a protocol for delegated private set intersection on outsourced datasets based on a novel point-value polynomial representation. Our protocol allows multiple clients to independently prepare and upload their private datasets to a server, and then ask the server to calculate their intersection. The protocol ensures that intersections can only be calculated with the permission of all clients and that datasets and results remain completely confidential from the server. Once datasets are outsourced, the protocol supports an unlimited number of intersections with no need to download them or prepare them again for computation. Our protocol is efficient and has computation and communication costs linear to the cardinality of the datasets. We also provide a formal security analysis of the protocol.
引用
收藏
页码:3 / 17
页数:15
相关论文
共 24 条
[1]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]  
[Anonymous], 2012, ASIACCS
[3]  
[Anonymous], 1974, The design and analysis of computer algorithms
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]  
Backes Michael, 2013, P 2013 ACM SIGSAC C, P863
[6]  
Canetti R, 2014, LECT NOTES COMPUT SC, V8383, P113, DOI 10.1007/978-3-642-54631-0_7
[7]  
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
[8]  
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13
[9]  
Dong C, 2013, P 2013 ACM SIGSAC C, P789
[10]   Efficiently Verifiable Computation on Encrypted Data [J].
Fiore, Dario ;
Gennaro, Rosario ;
Pastro, Valerio .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :844-855