Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity

被引:29
作者
Dong, Changyu [1 ]
Loukides, Grigorios [2 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[2] Kings Coll London, Dept Informat, London WC2R 2LS, England
基金
英国工程与自然科学研究理事会;
关键词
Data privacy; cryptographic protocols; data security; data mining;
D O I
10.1109/TIFS.2017.2721360
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The computation of private set union/intersection cardinality (PSU-CA/PSI-CA) is one of the most intensively studied problems in privacy preserving data mining (PPDM). However, the existing protocols are computationally too expensive to be employed in real-world PPDM applications. In response, we propose efficient approximate protocols, whose accuracy can be tuned according to application requirements. We first propose a two-party PSU-CA protocol based on Flajolet-Martin sketches. The protocol has logarithmic computational/communication complexity and relies mostly on symmetric key operations. Thus, it is much more efficient and scalable than existing protocols. In addition, our protocol can hide its output. This feature is necessary in PPDM applications, since the union cardinality is often an intermediate result that must not be disclosed. We then propose a two-party PSI-CA protocol, which is derived from the PSU-CA protocol with virtually no cost. Both our two-party protocols can be easily extended to the multiparty setting. We also design an efficient masking scheme for ((1)(n))-OT. The scheme is used in optimizing the two-party protocols and is of independent interest, since it can speed up ((1)(n))-OT significantly when n is large. Finally, we show through experiments the effectiveness and efficiency of our protocols.
引用
收藏
页码:2792 / 2806
页数:15
相关论文
共 68 条
  • [51] Naor M., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P245, DOI 10.1145/301250.301312
  • [52] Naor M., 1999, P 1 ACM C EL COMM, P129
  • [53] Nishide T, 2007, LECT NOTES COMPUT SC, V4450, P343
  • [54] Data quality and systems theory
    Orr, K
    [J]. COMMUNICATIONS OF THE ACM, 1998, 41 (02) : 66 - 71
  • [55] Peralta R. C., 2005, EL C COMP COMPL
  • [56] Pinkas B., 2016, 2016930 IACR CRYPT E, P930
  • [57] Pinkas B, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P515
  • [58] Pinkas B, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P797
  • [59] Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
    Pullonen, Pille
    Siim, Sander
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 172 - 183
  • [60] Rabin M. O., 1981, TR81 DEP AIK COMP LA