Privacy-preserving mixed set operations

被引:10
作者
Wang, Wenli [1 ]
Li, Shundong [1 ]
Dou, Jiawei [2 ]
Du, Runmeng [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure multiparty computation; Privacy-Preserving; Set operation; Set union; Set intersection; INTERSECTION; EFFICIENT;
D O I
10.1016/j.ins.2020.03.049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving set operations have important practical and theoretical significance and have always been a research focus of secure multiparty computation. Most existing studies focus on single set operations which cannot express many complicated set operations. However, the studies on mixed set operations are highly limited. The available protocols for mixed set operations can only be implemented through a threshold fully homomorphic encryption scheme. Since mixed set operations are necessary in practice, it is necessary to design an efficient and practical secure computation protocol for mixed set operations. In this paper, we propose a new protocol for mixed set operations that is based on a new encoding method and the threshold ElGamal cryptosystem. Through an efficiency analysis, it is proved that the efficiency of the protocol that is proposed in this paper are significantly higher than those of the available protocols. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:67 / 81
页数:15
相关论文
共 37 条
  • [1] Efficient Delegated Private Set Intersection on Outsourced Private Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Metere, Roberto
    Dong, Changyu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 608 - 624
  • [2] Alisa G., 2018, 2 INT C ART SCI ENG, P224
  • [3] [Anonymous], 2004, FDN CRYPTOGRAPHY BAS, DOI DOI 10.1017/CBO9780511721656
  • [4] [Anonymous], 2013, DISCONCERTING DETAIL
  • [5] Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
  • [6] Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
    Boneh, Dan
    Gennaro, Rosario
    Goldfeder, Steven
    Jain, Aayush
    Kim, Sam
    Rasmussen, Peter M. R.
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 565 - 596
  • [7] Fast Private Set Intersection from Homomorphic Encryption
    Chen, Hao
    Laine, Kim
    Rindal, Peter
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1243 - 1255
  • [8] Privacy-preserving disjunctive normal form-operations on distributed sets
    Chun, Ji Young
    Hong, Dowon
    Jeong, Ik Rae
    Lee, Dong Hoon
    [J]. INFORMATION SCIENCES, 2013, 231 : 113 - 122
  • [9] De Cristofaro Emiliano, 2012, LNCS, P218, DOI DOI 10.1007/978-3-642-35404-5_17
  • [10] Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity
    Dong, Changyu
    Loukides, Grigorios
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2792 - 2806