Scalable Private Set Intersection Based on OT Extension

Author:

Pinkas Benny1,Schneider Thomas2,Zohner Michael2

Affiliation:

1. Bar-Ilan University, Ramat-Gan, Israel

2. Technische Universität Darmstadt, Darmstadt, Germany

Abstract

Private set intersection (PSI) allows two parties to compute the intersection of their sets without revealing any information about items that are not in the intersection. It is one of the best studied applications of secure computation and many PSI protocols have been proposed. However, the variety of existing PSI protocols makes it difficult to identify the solution that performs best in a respective scenario, especially since they were not compared in the same setting. In addition, existing PSI protocols are several orders of magnitude slower than an insecure naïve hashing solution, which is used in practice. In this article, we review the progress made on PSI protocols and give an overview of existing protocols in various security models. We then focus on PSI protocols that are secure against semi-honest adversaries and take advantage of the most recent efficiency improvements in Oblivious Transfer (OT) extension, propose significant optimizations to previous PSI protocols, and suggest a new PSI protocol whose runtime is superior to that of existing protocols. We compare the performance of the protocols, both theoretically and experimentally, by implementing all protocols on the same platform, give recommendations on which protocol to use in a particular setting, and evaluate the progress on PSI protocols by comparing them to the currently employed insecure naïve hashing protocol. We demonstrate the feasibility of our new PSI protocol by processing two sets with a billion elements each.

Funder

European Union's 7th Framework Program

German Federal Ministry of Education and Research (BMBF) within EC SPRIDE and CRISP

Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office

Hessian LOEWE excellence initiative within CASED

BIU Center for Research in Applied Cryptography

National Science Foundation

DFG as part of Project E4 within the CRC 1119 CROSSING

Israel Ministry of Science and Technology

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference71 articles.

1. A. Abadi S. Terzis and C. Dong. 2015. O-PSI: Delegated private set intersection on outsourced datasets. In ICT Systems Security and Privacy Protection (SEC’15) (IFIP AICT) Vol. 455. Springer 3--17. A. Abadi S. Terzis and C. Dong. 2015. O-PSI: Delegated private set intersection on outsourced datasets. In ICT Systems Security and Privacy Protection (SEC’15) (IFIP AICT) Vol. 455. Springer 3--17.

2. A. Abadi S. Terzis and C. Dong. 2017. VD-PSI: Verifiable delegated private set intersection on outsourced private datasets. In Financial Cryptography and Data Security (FC’16)(LNCS) Vol. 9603. Springer 149--168. A. Abadi S. Terzis and C. Dong. 2017. VD-PSI: Verifiable delegated private set intersection on outsourced private datasets. In Financial Cryptography and Data Security (FC’16)(LNCS) Vol. 9603. Springer 149--168.

3. M. R. Albrecht C. Rechberger T. Schneider T. Tiessen and M. Zohner. 2015. Ciphers for MPC and FHE. In Advances in Cryptology—EUROCRYPT’15 (LNCS) Vol. 9056. Springer 430--454. 10.1007/978-3-662-46800-5_17 M. R. Albrecht C. Rechberger T. Schneider T. Tiessen and M. Zohner. 2015. Ciphers for MPC and FHE. In Advances in Cryptology—EUROCRYPT’15 (LNCS) Vol. 9056. Springer 430--454. 10.1007/978-3-662-46800-5_17

4. Y. Arbitman M. Naor and G. Segev. 2010. Backyard cuckoo hashing: Constant worst-case operations with a succinct representation. In Foundations of Computer Science (FOCS’10). IEEE 787--796. 10.1109/FOCS.2010.80 Y. Arbitman M. Naor and G. Segev. 2010. Backyard cuckoo hashing: Constant worst-case operations with a succinct representation. In Foundations of Computer Science (FOCS’10). IEEE 787--796. 10.1109/FOCS.2010.80

5. G. Asharov Y. Lindell T. Schneider and M. Zohner. 2013. More efficient oblivious transfer and extensions for faster secure computation. In Computer and Communications Security (CCS’13). ACM 535--548. 10.1145/2508859.2516738 G. Asharov Y. Lindell T. Schneider and M. Zohner. 2013. More efficient oblivious transfer and extensions for faster secure computation. In Computer and Communications Security (CCS’13). ACM 535--548. 10.1145/2508859.2516738

Cited by 177 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Efficient multi-party PSI and its application in port management;Computer Standards & Interfaces;2025-01

2. New approach for efficient malicious multiparty private set intersection;Information Sciences;2024-09

3. Quantum multi-party private set intersection using single photons;Physica A: Statistical Mechanics and its Applications;2024-09

4. Encrypted data-sharing for preserving privacy in wastewater-based epidemiology;Science of The Total Environment;2024-08

5. Privacy-preserving two-party computation of line segment intersection;International Journal of Information Security;2024-07-31

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3