SummaryPrivate set intersection (PSI) protocols enable 2 parties to compute the intersection of their inputs without compromising anything about the datasets beyond the intersection. With the advent of cloud computing, outsourcing computation has been attracted wide range of attention from research community and applied widely in the industry. The cloud computing allows resources restrained devices to outsource their expensive computation to the cloud. Based on Abadi's O-PSI, we present a variant of delegated private set intersection protocol secure in the semi-honest model under RSA assumption, and we also give an efficient and secure outsourcing computation algorithm for RSA cryptosystem. Depending on this algorithm, we transform a variant of delegated private set intersection protocol into an improved outsourced one. It enables the clients only to perform simple modular multiplication for computing what they want during the execution of protocol. Besides, the variant of delegated protocol can be easily extended to multiple clients.Compared with the state of the art, our proposed protocol has great advantage in efficiency. We finally evaluate these protocols and prove their security in the semi-honest model.
KEYWORDScloud computing, outsourced computation, polynomial interpolation, private set intersection
INTRODUCTIONPrivate set intersection protocols are the branch of secure multi-party computation (SMPC), 1,2 which have been studied for many years. It allows 2 parties or multiple parties to compute the intersections privately for their sets without revealing any other information. As a novel cryptographic primitive, PSI not only solves the privacy-preserving problems in datasets, but also as a building block applied in the real life settings, such as privacy-preserving data mining, 3 health care research, human genome project, 4 homeland security, 5 and information flow control. 6 For instance, suppose 2 accounts holders want to know their common friends in social network whereas they both do not want to leak their privacy. It seems to be a challengeable problem. However, with PSI protocols, 2 holders can privately know the result and do not need to publish total information.With the advent of cloud computing, outsourced computation 7 has been the main tendency for clients with limited computational resources. It allows them to outsource their private data to the cloud to compute the results. Using powerful cloud computing to construct and implement private set intersection protocol is becoming a new scientific research field. On the one hand, cloud computing provides huge resources for us to achieve efficient private set intersection protocol. On the other hand, it also brings about some challenges.In traditional private set intersection protocol, it only involves 2 participants to interact with each other. However, in the cloud computing environment, the cloud server as the third party takes part in the private set intersection protocol, which is not totally trusted. Therefore, the datasets transferred to...