2017
DOI: 10.1002/cpe.4329
|View full text |Cite
|
Sign up to set email alerts
|

Improved outsourced private set intersection protocol based on polynomial interpolation

Abstract: SummaryPrivate set intersection (PSI) protocols enable 2 parties to compute the intersection of their inputs without compromising anything about the datasets beyond the intersection. With the advent of cloud computing, outsourcing computation has been attracted wide range of attention from research community and applied widely in the industry. The cloud computing allows resources restrained devices to outsource their expensive computation to the cloud. Based on Abadi's O-PSI, we present a variant of delegated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 42 publications
0
10
0
Order By: Relevance
“…e data user and the data owner would like to outsource their data sets to the cloud and delegate set intersection computation to the cloud. [5,7,11]. Moreover, public key encryption with equality test [12][13][14][15] can also be used to attain this goal.…”
Section: Related Workmentioning
confidence: 99%
“…e data user and the data owner would like to outsource their data sets to the cloud and delegate set intersection computation to the cloud. [5,7,11]. Moreover, public key encryption with equality test [12][13][14][15] can also be used to attain this goal.…”
Section: Related Workmentioning
confidence: 99%
“…Supposing the smaller set with the size N s and the larger one with N l , the communication complexity of the proposed scheme is O(N s log N l ). With the multiplicatively homomorphic property of RSA cryptosystem, Yang et al [167] presented an efficient set intersection protocol, secure in the semi-honest model. The protocol assumes that two different parties (i.e., A and B) hold their individual private sets, which are encrypted and outsourced to the cloud.…”
Section: ) Set Intersectionmentioning
confidence: 99%
“…A well-constructed scheme is not supposed to disturb users nor add excessive burden to servers. To measure the efficiency of related works [167], [170], [171], [179], [182], [183], we consider the overhead of the involved operations (including the time and resources consumed for data encryption/decryption, data processing, data transmission and result verification), which are generalized as computation and communication complexities. Take the scheme [170] and [171] as examples to analyze the complexities of their private set union protocols.…”
Section: Computation and Communication Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…The last paper “ Improved Outsourced Private Set Intersection Protocol Based on Polynomial Interpolation ” by Yang et al investigates issues in private set intersection (PSI) protocols, which enable two parties to compute the intersection of their inputs without compromising anything about the datasets beyond the intersection. The authors present a variant of delegated private set intersection protocol secure in the semi‐honest model under RSA assumption as well as an efficient and secure outsourcing computation algorithm for RSA crypto‐system.…”
mentioning
confidence: 99%