Blockchain-Based Unbalanced PSI with Public Verification and Financial Security
-
Published:2024-05-15
Issue:10
Volume:12
Page:1544
-
ISSN:2227-7390
-
Container-title:Mathematics
-
language:en
-
Short-container-title:Mathematics
Author:
Wang Zhanshan1ORCID, Ma Xiaofeng1
Affiliation:
1. Department of Control Science and Engineering, Tongji University, Shanghai 201804, China
Abstract
Private set intersection (PSI) enables two parties to determine the intersection of their respective datasets without revealing any information beyond the intersection itself. This paper particularly focuses on the scenario of unbalanced PSI, where the sizes of datasets possessed by the parties can significantly differ. Current protocols for unbalanced PSI under the malicious security model exhibit low efficiency, rendering them impractical in real-world applications. By contrast, most efficient unbalanced PSI protocols fail to guarantee the correctness of the intersection against a malicious server and cannot even ensure the client’s privacy. The present study proposes a blockchain-based unbalanced PSI protocol with public verification and financial security that enables the client to detect malicious behavior from the server (if any) and then generate an irrefutable and publicly verifiable proof without compromising its secret. The proof can be verified through smart contracts, and some economic incentive and penalty measures are executed automatically to achieve financial security. Furthermore, we implement the proposed protocol, and experimental results demonstrate that our scheme exhibits low online communication complexity and computational overhead for the client. At the same time, the size of the generated proof and its verification complexity are both O(logn), enabling cost-effective validation on the blockchain.
Funder
National Key R&D Program of China
Reference40 articles.
1. Chen, H., Laine, K., and Rindal, P. (November, January 30). Fast Private Set Intersection from Homomorphic Encryption. Proceedings of the 24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS), Dallas, TX, USA. 2. Zhou, Q., Zeng, Z., Wang, K., and Chen, M. (2022). Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection. Cryptography, 6. 3. Mezzour, G., Perrig, A., Gligor, V., and Papadimitratos, P. (2009, January 12–14). Privacy-Preserving Relationship Path Discovery in Social Networks. Proceedings of the 8th International Conference on Cryptology and Network Security, Kanazawa, Japan. 4. Li, J., Liu, Y.M., and Wu, S. (2021, January 7–11). Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption. Proceedings of the 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), Virtual Event, Hong Kong. 5. Pinkas, B., Schneider, T., Zohner, M., and Assoc, U. (2014, January 20–22). Faster Private Set Intersection based on OT Extension. Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|