Fast and Private Computation of Cardinality of Set Intersection and Union

作者: Emiliano De Cristofaro , Paolo Gasti , Gene Tsudik

DOI: 10.1007/978-3-642-35404-5_17

关键词:

摘要: In many everyday scenarios, sensitive information must be shared between parties without complete mutual trust. Private set operations are particularly useful to enable sharing with privacy, as they allow two or more jointly compute on their sets (e.g., intersection, union, etc.), such that only the minimum required amount of is disclosed. last few years, research community has proposed a number secure and efficient techniques for Set Intersection (PSI), however, somewhat less explored problem computing magnitude, rather than contents, intersection – we denote this Cardinality (PSI-CA). This paper explores PSI-CA variations constructs several protocols state-of-the-art.

参考文章(41)
Giuseppe Ateniese, Marina Blanton, Jonathan Kirsch, Secret Handshakes with Dynamic and Fuzzy Matching. network and distributed system security symposium. ,(2007)
Jae Hong Seo, Jung Hee Cheon, Jonathan Katz, Constant-Round multi-party private set union using reversed laurent series public key cryptography. pp. 398- 412 ,(2012) , 10.1007/978-3-642-30057-8_24
Jonathan Katz, David Evans, Yan Huang, Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? network and distributed system security symposium. ,(2012)
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Emiliano De Cristofaro, Gene Tsudik, Practical private set intersection protocols with linear complexity financial cryptography. ,vol. 6052, pp. 143- 159 ,(2010) , 10.1007/978-3-642-14577-3_13
Keith Frikken, Privacy-Preserving Set Union Applied Cryptography and Network Security. pp. 237- 252 ,(2007) , 10.1007/978-3-540-72738-5_16
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik, Linear-complexity private set intersection protocols secure in malicious model international conference on the theory and application of cryptology and information security. pp. 213- 231 ,(2010) , 10.1007/978-3-642-17373-8_13
Susan Hohenberger, Stephen A. Weis, Honest-verifier private disjointness testing without random oracles privacy enhancing technologies. pp. 277- 294 ,(2006) , 10.1007/11957454_16
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891