Multi-Party Private Set Intersection: An Information-Theoretic Approach

نویسندگان

چکیده

We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there are M parties, each storing a data P i over N replicated and non-colluding databases, we want to calculate sets ∩ xmlns:xlink="http://www.w3.org/1999/xlink">i=1 M without leaking any information beyond parties. consider specific communication protocol where one called leader party, initiates MP-PSI by sending queries remaining parties which client The not allowed communicate with other. propose an information-theoretic scheme that privately calculates download cost D = min xmlns:xlink="http://www.w3.org/1999/xlink">t ∈ {1,... xmlns:xlink="http://www.w3.org/1999/xlink">, M} Σ xmlns:xlink="http://www.w3.org/1999/xlink">i {1,..., M}\t ⌈[| xmlns:xlink="http://www.w3.org/1999/xlink">t |N ]/[N -1]⌉. Similar 2-party PSI problem, our builds on connection between multi-message symmetric retrieval (MM-SPIR) problem. Our is non-trivial generalization as it needs intricate design shared common randomness. Interestingly, in terms cost, does incur penalty due more stringent privacy constraints compared

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security

In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, these ...

متن کامل

Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security

In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality of Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, the...

متن کامل

Scalable Multi-party Private Set-Intersection

In this work we study the problem of private set-intersection in the multi-party setting and design two protocols with the following improvements compared to prior work. First, our protocols are designed in the so-called star network topology, where a designated party communicates with everyone else, and take a new approach of leveraging the 2PC protocol of [FNP04]. This approach minimizes the ...

متن کامل

Information Theoretically Secure Multi Party Set Intersection Re-visited

We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem with n parties, that provides information theoretic security, when t < n 3 parties are corrupted by an active adversary having unbounded computing power. In [16], the authors claimed that their protocol takes six roun...

متن کامل

An Unconditionally Secure Protocol for Multi-Party Set Intersection

Existing protocols for private set intersection are based on homomorphic public-key encryption and the technique of representing sets as polynomials in the cryptographic model. Based on the ideas of these protocols and the two-dimensional verifiable secret sharing scheme, we propose a protocol for private set intersection in the informationtheoretic model. By representing the sets as polynomial...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE journal on selected areas in information theory

سال: 2021

ISSN: ['2641-8770']

DOI: https://doi.org/10.1109/jsait.2021.3057597