Abstract

Threshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all of them rely on lots of expensive public-key techniques or require an exponential number of possible combinations among the shares. In this work, we design an efficient TPSI protocol, which achieves computational security in semi-honest model. To improve the efficiency of the TPSI protocol, we design a new TPSI protocol based on garbled Bloom filter (GBF) and threshold secret sharing, which uses a small amount of public-key operations. Moreover, our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares. The performance analysis shows that our protocol is more efficient than the previous TPSI protocols. To the best of our knowledge, the optimal TPSI protocol implemented by Zhao and Chow (WPES’18) has an online time of 78 seconds to compute the intersection of two datasets of 100 elements each with threshold $t=50$ . In contrast, our protocol has a total time of 2.988 seconds.

Highlights

  • Private set intersection (PSI) is one of the important branches of secure multiparty computation (MPC)

  • CONTRIBUTIONS In this work, we propose an efficient Threshold private set intersection (TPSI) protocol

  • Our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares, and we need to ensure that at any value of threshold t, the receiver has the possibility of getting the intersection

Read more

Summary

INTRODUCTION

Private set intersection (PSI) is one of the important branches of secure multiparty computation (MPC). Our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares, and we need to ensure that at any value of threshold t, the receiver has the possibility of getting the intersection. In order to ensure that the Reed-Solomon code can reconstruct the secret in the requirements of the TPSI parameters, we add n − t dummy elements to the sets of both parties.. In order to ensure that the Reed-Solomon code can reconstruct the secret in the requirements of the TPSI parameters, we add n − t dummy elements to the sets of both parties.1 These dummy elements are chosen by pseudo-random generator with the seed selected by the parties. It’s proved that our protocol is secure in the semi-honest setting, and our proof is completed

PERFORMANCE AND COMPARISON
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call