Efficient Threshold Private Set Intersection
نویسندگان
چکیده
Threshold private set intersection (TPSI) allows a receiver to obtain the when cardinality of is greater or equal threshold, which has wide range applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all them rely on lots expensive public-key techniques require an exponential number possible combinations among shares. In this work, we design efficient protocol, achieves computational security in semi-honest model. To improve efficiency new protocol based garbled Bloom filter (GBF) threshold secret sharing, uses small amount operations. Moreover, our combines with Reed-Solomon decoding algorithm reconstruct feasible method avoid calculating The performance analysis shows that more than previous protocols. best knowledge, optimal implemented by Zhao Chow (WPES'18) time 78 seconds compute two datasets 100 elements each t = 50. contrast, total 2.988 seconds.
منابع مشابه
Private and Threshold Set-Intersection
In this paper we consider the problem of privately computing the set-intersection (private matching) of sets, as well as several variations on this problem: cardinality set-intersection, threshold set-intersection, and over-threshold set-intersection. Cardinality set-intersection is the problem of determining the size of the intersection set, without revealing the actual set. In threshold set-i...
متن کاملPrivate and threshold set-intersection
In this paper we consider the problem of privately computing the intersection of sets (setintersection), as well as several variations on this problem: cardinality set-intersection, threshold set-intersection, and over-threshold set-intersection. Cardinality set-intersection is the problem of determining the size of the intersection set, without revealing the actual threshold set. In threshold ...
متن کاملEfficient Robust Private Set Intersection
Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first so...
متن کاملEfficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. We present protocols, based on the use of homomorphic encryption and balanced hashing, for both semi-honest and malicious environments. For lists of length k, we obtain O(k) ...
متن کاملEfficient Delegated Private Set Intersection on Outsourced Private Datasets
Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloud computing power and popularity have been swiftly growing, it is now desirable to leverage the cloud to store private datasets and delegate PSI computation to it. Although a set of efficient PSI protocols have been designed, none support outsourcing of the datasets and the comput...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2020.3048743