Efficient Delegated Private Set Intersection on Outsourced Private Datasets

被引:70
作者
Abadi, Aydin [1 ]
Terzis, Sotirios [1 ]
Metere, Roberto [2 ]
Dong, Changyu [2 ]
机构
[1] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow G1 1XQ, Lanark, Scotland
[2] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Private set intersection; secure computation; cloud computing; SECURE;
D O I
10.1109/TDSC.2017.2708710
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloud computing power and popularity have been swiftly growing, it is now desirable to leverage the cloud to store private datasets and delegate PSI computation to it. Although a set of efficient PSI protocols have been designed, none support outsourcing of the datasets and the computation. In this paper, we propose two protocols for delegated PSI computation on outsourced private datasets. Our protocols have a unique combination of properties that make them particularly appealing for a cloud computing setting. Our first protocol, O-PSI, satisfies these properties by using additive homomorphic encryption and point-value polynomial representation of a set. Our second protocol, EO-PSI, is mainly based on a hash table and point-value polynomial representation and it does not require public key encryption; meanwhile, it retains all the desirable properties and is much more efficient than the first one. We also provide a formal security analysis of the two protocols in the semi-honest model and we analyze their performance utilizing prototype implementations we have developed. Our performance analysis shows that EO-PSI scales well and is also more efficient than similar state-of-the-art protocols for large set sizes.
引用
收藏
页码:608 / 624
页数:17
相关论文
共 39 条
[1]   O-PSI: Delegated Private Set Intersection on Outsourced Datasets [J].
Abadi, Aydin ;
Terzis, Sotirios ;
Dong, Changyu .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 :3-17
[2]  
AGGARWAL CC, 2008, PRIVACY PRESERVING D, V33, DOI DOI 10.1145/1331904.1331906
[3]  
Aho Alfred V., 1974, The Design and Analysis of Computer Algorithms
[4]  
Annenko O., 2016, ENTERPRISE CLOUD ADO
[5]  
[Anonymous], 2012, ASIACCS
[6]  
[Anonymous], 2011, Decis Support Syst, DOI DOI 10.1016/J.DSS.2010.12.006
[7]  
[Anonymous], [No title captured]
[8]  
Ateniese G, 2011, LECT NOTES COMPUT SC, V6571, P156, DOI 10.1007/978-3-642-19379-8_10
[9]  
Berenbrink P., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P745, DOI 10.1145/335305.335411
[10]   Barycentric Lagrange interpolation [J].
Berrut, JP ;
Trefethen, LN .
SIAM REVIEW, 2004, 46 (03) :501-517