Faster Unbalanced Private Set Intersection

被引:26
作者
Davi Resende, Amanda C. [1 ]
Aranha, Diego F. [1 ]
机构
[1] Univ Campinas UNICAMP, Inst Comp, Campinas, Brazil
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018 | 2018年 / 10957卷
基金
巴西圣保罗研究基金会;
关键词
Cuckoo filter; Private set intersection; Unbalanced PSI; Software implementation;
D O I
10.1007/978-3-662-58387-6_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocols for Private Set Intersection (PSI) are important cryptographic primitives that perform joint operations on datasets in a privacy-preserving way. They allow two parties to compute the intersection of their private sets without revealing any additional information beyond the intersection itself. Unfortunately, PSI implementations in the literature do not usually employ the best possible cryptographic implementation techniques. This results in protocols presenting computational and communication complexities that are prohibitive, particularly in the case when one of the participants is a low-powered device and there are bandwidth restrictions. This paper builds on modern cryptographic engineering techniques and proposes optimizations for a promising one-way PSI protocol based on public-key cryptography. For the case when one of the parties holds a set much smaller than the other (a realistic assumption in many scenarios) we show that our improvements and optimizations yield a protocol that outperforms the communication complexity and the run time of previous proposals by around one thousand times.
引用
收藏
页码:203 / 221
页数:19
相关论文
共 42 条
[1]  
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
[2]  
[Anonymous], 2012, IACR CRYPTOLOGY EPRI
[3]  
[Anonymous], 2010, USENIX SECURITY 2010
[4]  
[Anonymous], 2012, NDSS
[5]   Binary Elligator Squared [J].
Aranha, Diego F. ;
Fouque, Pierre-Alain ;
Qian, Chen ;
Tibouchi, Mehdi ;
Zapalowicz, Jean-Christophe .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 :20-37
[6]   Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation [J].
Arbitman, Yuriy ;
Naor, Moni ;
Segev, Gil .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :787-796
[7]  
Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
[8]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[9]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5628, P108, DOI 10.1007/978-3-642-03549-4_7
[10]   Fast Private Set Intersection from Homomorphic Encryption [J].
Chen, Hao ;
Laine, Kim ;
Rindal, Peter .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1243-1255