Efficient Set Intersection with Simulation-Based Security

被引:2
|
作者
Michael J. Freedman
Carmit Hazay
Kobbi Nissim
Benny Pinkas
机构
[1] Princeton University,Department of Computer Science
[2] Bar-Ilan University,Faculty of Engineering
[3] Ben-Gurion University,Department of Computer Science
[4] Bar-Ilan University,Department of Computer Science
来源
Journal of Cryptology | 2016年 / 29卷
关键词
Simulation-based Security; Hashing Scheme; Random Oracle; Semi-honest Setting; Cuckoo Hashing;
D O I
暂无
中图分类号
学科分类号
摘要
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. In this work, we present protocols based on the use of homomorphic encryption and different hashing schemes for both the semi-honest and malicious environments. The protocol for the semi-honest environment is secure in the standard model, while the protocol for the malicious environment is secure in the random oracle model. Our protocols obtain linear communication and computation overhead. We further implement different variants of our semi-honest protocol. Our experiments show that the asymptotic overhead of the protocol is affected by different constants. (In particular, the degree of the polynomials evaluated by the protocol matters less than the number of polynomials that are evaluated.) As a result, the protocol variant with the best asymptotic overhead is not necessarily preferable for inputs of reasonable size.
引用
收藏
页码:115 / 155
页数:40
相关论文
共 50 条
  • [1] Efficient Set Intersection with Simulation-Based Security
    Freedman, Michael J.
    Hazay, Carmit
    Nissim, Kobbi
    Pinkas, Benny
    JOURNAL OF CRYPTOLOGY, 2016, 29 (01) : 115 - 155
  • [2] Efficient Inner Product Encryption with Simulation-Based Security
    Zhao, Qingsong
    Zeng, Qingkai
    Liu, Ximeng
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 162 - 171
  • [3] Efficient functional encryption for inner product with simulation-based security
    Wenbo Liu
    Qiong Huang
    Xinjian Chen
    Hongbo Li
    Cybersecurity, 4
  • [4] Efficient functional encryption for inner product with simulation-based security
    Liu, Wenbo
    Huang, Qiong
    Chen, Xinjian
    Li, Hongbo
    CYBERSECURITY, 2021, 4 (01)
  • [5] On the relationships between notions of simulation-based security
    Kuesters, Ralf
    Datta, Anupam
    Mitchell, John C.
    Ramanathan, Ajith
    JOURNAL OF CRYPTOLOGY, 2008, 21 (04) : 492 - 546
  • [6] Efficient simulation-based discrete optimization
    Guikema, SD
    Davidson, RA
    Çagnan, Z
    PROCEEDINGS OF THE 2004 WINTER SIMULATION CONFERENCE, VOLS 1 AND 2, 2004, : 536 - 544
  • [7] On the Achievability of Simulation-Based Security for Functional Encryption
    De Caro, Angelo
    Iovino, Vincenzo
    Jain, Abhishek
    O'Neill, Adam
    Paneth, Omer
    Persiano, Giuseppe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 519 - 535
  • [8] On the Relationships between Notions of Simulation-Based Security
    Ralf Küsters
    Anupam Datta
    John C. Mitchell
    Ajith Ramanathan
    Journal of Cryptology, 2008, 21 : 492 - 546
  • [9] Emerging simulation-based education in physiology: at the intersection of novelty and feasibility
    Surapaneni, Krishna Mohan
    ADVANCES IN PHYSIOLOGY EDUCATION, 2023, 47 (04) : 888 - 888
  • [10] Ideal Key Derivation and Encryption in Simulation-Based Security
    Kuesters, Ralf
    Tuengerthal, Max
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 161 - 179