Privacy-preserving statistical computing protocols for private set intersection

被引:8
|
作者
Niu, Ziyu [1 ]
Wang, Hao [1 ,2 ]
Li, Zhi [1 ]
Song, Xiangfu [3 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, 1 Univ Rd, Jinan 250358, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
privacy‐ preserving; private set intersection; secure multiparty computation; statistical computing; CARDINALITY;
D O I
10.1002/int.22420
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet and the widespread application of distributed computing, people enjoy various conveniences while at the same time their privacy has also been threatened. Secure multiparty computation (MPC) can solve the problem of how data owners who do not trust each other jointly compute in distributed scenarios. Using MPC technique, people can not only realize data joint computing, but also ensure data privacy. In most data application scenarios, private data held by different parties can often be represented by sets. To complete the relevant statistical computations of the intersection of two private sets, we propose a suite of protocols based on MPC. These protocols can compute the statistical functions of the associated data of the intersection, including cardinality, sum, average, variance, range, and so forth, without revealing any additional information other than the result. To achieve these functions, we design a private membership test protocol with the result as the arithmetic sharing value, called the arithmetic shared private membership test (ASPMT) protocol. On the basis of the ASPMT protocol, the size and other statistics of the intersection can be computed securely and efficiently. All fundamental computations are constructed based on secret sharing and oblivious transfer techniques. Thanks to the use of precomputation technique, all protocols are highly efficient.
引用
收藏
页码:10118 / 10139
页数:22
相关论文
共 50 条
  • [1] Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
    Eskeland, Sigurd
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2024, 18 (01)
  • [2] Using private set intersection to achieve privacy-preserving authorization for IoT systems
    Cai, Rongsheng
    Chen, Lanxiang
    Zhu, Yizhao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [3] Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection
    Miyaji A.
    Nakasho K.
    Nishida S.
    Journal of Medical Systems, 2017, 41 (3)
  • [4] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [5] Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection
    Adir, Allon
    Aharoni, Ehud
    Drucker, Nir
    Kushnir, Eyal
    Masalha, Ramy
    Mirkin, Michael
    Soceanu, Omri
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 398 - 424
  • [6] Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query
    Shi, Run-Hua
    Li, Yi-Fei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (06) : 2399 - 2411
  • [7] Achieving privacy-preserving sensitive attributes for large universe based on private set intersection
    Yang, Li
    Li, Cheng
    Cheng, Yuting
    Yu, Shui
    Ma, Jianfeng
    INFORMATION SCIENCES, 2022, 582 : 529 - 546
  • [8] A Privacy-Preserving Symptoms Retrieval System with the Aid of Homomorphic Encryption and Private Set Intersection Schemes
    Wang, Yi-Wei
    Wu, Ja-Ling
    ALGORITHMS, 2023, 16 (05)
  • [9] Private Set Intersection Protocol with Perfect Hashing on OKVS: An Enhanced Approach for Privacy-Preserving Operations
    Lee, Jiyeon
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [10] Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
    Hu, Jingwei
    Zhao, Yongjun
    Tan, Benjamin Hong Meng
    Aung, Khin Mi Mi
    Wang, Huaxiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6184 - 6196