Information Theoretically Secure Multi Party Set Intersection Re-visited
نویسندگان
چکیده
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem with n parties, that provides information theoretic security, when t < n 3 parties are corrupted by an active adversary having unbounded computing power. In [16], the authors claimed that their protocol takes six rounds of communication and communicates O(nm) field elements, where each party has a set containing m field elements. However, we show that the round and communication complexity of the protocol in [16] is much more than what is claimed in [16]. We then propose a novel information theoretically secure protocol for multiparty set intersection with n > 3t, which significantly improves the ”actual” round and communication complexity (as shown in this paper) of the protocol given in [16]. To design our protocol, we use several tools which are of independent interest.
منابع مشابه
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, these ...
متن کاملMulti Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality of Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, the...
متن کاملUnconditionally Secure Multiparty Set Intersection Re-Visited
In this paper, we re-visit the problem of unconditionally secure multiparty set intersection in information theoretic model. Li et.al [24] have proposed a protocol for n-party set intersection problem, which provides unconditional security when t < n 3 players are corrupted by an active adversary having unbounded computing power. Moreover, they have claimed that their protocol takes six rounds ...
متن کاملQuorum-Based Secure Multi-party Computation
This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturallymotivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general,...
متن کاملMulti-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such task could have multiple potential applications, in commerce, health-care, and security. However, all currently known secure set intersection protocols for n > 2 parties have computational costs that ...
متن کامل