Abstract

With the rising amount of digital technologies that we use on a daily basis, it is more important than ever to handle and process private data securely. Research and academic communities are becoming increasingly interested in multi-party computation, with a focus on the field of Private Set Intersection (PSI). In this regard, this work introduces a novel technique that successfully converts the Cid-Davidson Private Set Intersection protocol into a Threshold Private Set Intersection. It achieves this conversion by introducing two new protocols, TPSI-1 and TPSI-2, and utilizing two previously developed methodologies while the Reed-Solomon codes and the Shamir-secret sharing scheme are the foundations of TPSI-1, whereas Secure Comparison Protocols serve as the foundation for TPSI-2. Specifically, our suggested protocols perform better asymptotically than previous threshold PSI protocols because they have a fixed number of rounds and linear communication and computation complexity that increase with data set size. This study adds to the continuous effort to strengthen the security and effectiveness of private data calculations, highlighting how safe data processing is changing in an era where digital technologies are ingrained in every aspect of our lives.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.