Practical Multi-Party Private Set Intersection Protocols

被引:37
作者
Bay, Asli [1 ]
Erkin, Zekeriya [2 ]
Hoepman, Jaap-Henk [3 ,4 ]
Samardjiska, Simona [3 ]
Vos, Jelle [2 ]
机构
[1] Antalya Bilim Univ, Comp Engn Dept, TR-07190 Antalya, Turkey
[2] Delft Univ Technol, Dept Intelligent Syst, NL-2628 CD Delft, Netherlands
[3] Radboud Univ Nijmegen, Inst Comp & Informat Sci, NL-6525 XZ Nijmegen, Netherlands
[4] Univ Groningen, IT Law, NL-9712 CP Groningen, Netherlands
基金
欧盟地平线“2020”;
关键词
Protocols; Roads; Privacy; Diseases; Complexity theory; Servers; Safety; Privacy-preserving protocols; PSI; MPSI; threshold MPSI; threshold PKE; Bloom filters; CRYPTOSYSTEM;
D O I
10.1109/TIFS.2021.3118879
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the availability of data at any time. One of the fundamental problems in set operations is known as Private Set Intersection (PSI). The problem requires two parties to compute the intersection between their sets while preserving correctness and privacy. Although several efficient two-party PSI protocols already exist, protocols for PSI in the multi-party setting (MPSI) currently scale poorly with a growing number of parties, even though this applies to many real-life scenarios. This paper fills this gap by proposing two multi-party protocols based on Bloom filters and threshold homomorphic PKEs, which are secure in the semi-honest model. The first protocol is a multi-party PSI, whereas the second provides a more subtle functionality -threshold multi-party PSI (T-MPSI) - which outputs items of the server that appear in at least some number of other private sets. The protocols are inspired by the Davidson-Cid protocol based on Bloom filters. We compare our MPSI protocol against Kolesnikov et al., which is among the fastest known MPSI protocols. Our MPSI protocol performs better than Kolesnikov et al. in terms of run time, given that the sets are small and there is a large number of parties. Our T-MPSI protocol performs better than other existing works: the computational and communication complexities are linear in the number of elements in the largest set given a fixed number of colluding parties. We conclude that our MPSI and T-MPSI protocols are practical solutions suitable for emerging use-case scenarios with many parties, where previous solutions did not scale well.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 46 条
  • [1] Badrinarayanan S., 2020, IACR CRYPTOL
  • [2] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [3] On the false-positive rate of Bloom filters
    Bose, Prosenjit
    Guo, Hua
    Kranakis, Evangelos
    Maheshwari, Anil
    Morin, Pat
    Morrison, Jason
    Smid, Michiel
    Tang, Yihui
    [J]. INFORMATION PROCESSING LETTERS, 2008, 108 (04) : 210 - 213
  • [4] A two-party privacy preserving set intersection protocol against malicious users in cloud computing
    Cao, Xuefei
    Li, Hui.
    Dang, Lanjun
    Lin, Yin
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 54 : 41 - 45
  • [5] Cerulli A, 2018, LECT NOTES COMPUT SC, V10892, P280, DOI 10.1007/978-3-319-93387-0_15
  • [6] Cheon J. H., 2010, IACR CRYPTOL EPRINT, P512
  • [7] Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
    Cheon, Jung Hee
    Jarecki, Stanislaw
    Seo, Jae Hong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (08) : 1366 - 1378
  • [8] Cristofaro E.D., 2012, INT C CRYPTOLOGY NET, P218
  • [9] An Efficient Toolkit for Computing Private Set Operations
    Davidson, Alex
    Cid, Carlos
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 261 - 278
  • [10] Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter
    Debnath, Sumit Kumar
    Dutta, Ratna
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 209 - 226