Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

被引:30
作者
Cheon, Jung Hee [2 ]
Jarecki, Stanislaw [3 ]
Seo, Jae Hong [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Koganei, Tokyo 1848795, Japan
[2] Seoul Natl Univ, Dept Math Sci, Seoul 151747, South Korea
[3] Univ Calif Irvine, Sch Informat & Comp Sci, Irvine, CA 92697 USA
基金
新加坡国家研究基金会;
关键词
multi-parry set intersection; privacy-preserving set operation; EFFICIENT PROTOCOLS; SECURITY;
D O I
10.1587/transfun.E95.A.1366
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n > 2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n(2)k) bits of communication and (O) over tilde (n(2)k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.
引用
收藏
页码:1366 / 1378
页数:13
相关论文
共 28 条
  • [1] [Anonymous], 2003, Modern Computer Algebra
  • [2] Aumann Y, 2007, LECT NOTES COMPUT SC, V4392, P137
  • [3] Camenisch J, 2009, LECT NOTES COMPUT SC, V5628, P108, DOI 10.1007/978-3-642-03549-4_7
  • [4] Cohen J. D., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P372, DOI 10.1109/SFCS.1985.2
  • [5] Dachman-Soled D., 2009, LNCS, V5536, P126
  • [6] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
  • [7] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13
  • [8] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
  • [9] Feldman Paul., 1987, A Practical Scheme for Non-interactive Verifiable Secret Sharing Paul Feldman, P427
  • [10] Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1