Affiliation:
1. ANTALYA BILIM UNIVERSITY
Abstract
With the rising amount of digital technologies that we use on a daily basis, it is more important than ever to handle and process private data securely. Research and academic communities are becoming increasingly interested in multi-party computation, with a focus on the field of Private Set Intersection (PSI). In this regard, this work introduces a novel technique that successfully converts the Cid-Davidson Private Set Intersection protocol into a Threshold Private Set Intersection. It achieves this conversion by introducing two new protocols, TPSI-1 and TPSI-2, and utilizing two previously developed methodologies while the Reed-Solomon codes and the Shamir-secret sharing scheme are the foundations of TPSI-1, whereas Secure Comparison Protocols serve as the foundation for TPSI-2. Specifically, our suggested protocols perform better asymptotically than previous threshold PSI protocols because they have a fixed number of rounds and linear communication and computation complexity that increase with data set size. This study adds to the continuous effort to strengthen the security and effectiveness of private data calculations, highlighting how safe data processing is changing in an era where digital technologies are ingrained in every aspect of our lives.
Publisher
Mugla Sitki Kocman University
Reference41 articles.
1. “The Disconcerting Details: How Facebook Teams Up With Data Brokers to
Show You Targeted Ads.” https://www.eff.org/deeplinks/2013/04/
disconcerting-details-how-facebook-teams-data-brokers-show-you-targeted-ads, 2013. Accessed: 2021-11-25.
2. Hallgren, P., Orlandi, C. and Sabelfeld, A., “Privatepool: Privacy-preserving ridesharing,” in 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 276–291, 2017.
3. Sherif, A. B. T., Rabieh, K., Mahmoud, . M. E. A. and Liang, X., “Privacy-preserving ride sharing
scheme for autonomous vehicles in big data era,” IEEE Internet of Things Journal, vol. 4, no. 2,
pp. 611–618, 2017.
4. Zhao, Y. and. Chow, S. S. M, “Can you find the one for me? privacy-preserving matchmaking via
threshold psi.” Cryptology ePrint Archive, Report 2018/184, 2018. https://ia.cr/2018/
184.
5. Yao, A. C.-C. , “Protocols for secure computations (extended abstract),” in FOCS, pp. 160–164,
IEEE Computer Society, 1982.