2020
DOI: 10.1007/978-3-030-65411-5_20
|View full text |Cite
|
Sign up to set email alerts
|

Linear Complexity Private Set Intersection for Secure Two-Party Protocols

Abstract: In this paper, we propose a new private set intersection (PSI) protocol that computes the following functionality. The two parties (P1 and P2) input two sets of items (X and Y , respectively) and one of the parties outputs a function of the intersection (f (X ∩ Y )). This functionality is generally required when the PSI protocol is used as a part of a larger secure two-party secure computation. Pinkas et al. presented a PSI protocol at Eurocrypt 2019 for this functionality, which has linear complexity only in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…We construct Circuit-PSI protocols with communication and computational costs linear in n (this asymptotically matches recent work [27]). We demonstrate that our protocols are concretely better than the state-of-the-art [43] (which in turn outperforms [27]) -as an example, our protocol is ≈ 2.3× more communication efficient and 2.3 − 2.8× faster (in LAN/WAN settings) than [43], when P 0 's and P 1 's sets comprise of 2 22 elements. We also extend our protocol to support computing functions on intersection of input sets with associated payloads.…”
Section: Our Contributionsmentioning
confidence: 64%
See 4 more Smart Citations
“…We construct Circuit-PSI protocols with communication and computational costs linear in n (this asymptotically matches recent work [27]). We demonstrate that our protocols are concretely better than the state-of-the-art [43] (which in turn outperforms [27]) -as an example, our protocol is ≈ 2.3× more communication efficient and 2.3 − 2.8× faster (in LAN/WAN settings) than [43], when P 0 's and P 1 's sets comprise of 2 22 elements. We also extend our protocol to support computing functions on intersection of input sets with associated payloads.…”
Section: Our Contributionsmentioning
confidence: 64%
“…Security Model. Following prior works on Circuit-PSI [16,25,27,[42][43][44], we provide security against static probabilistic polynomial time (PPT) semi-honest adversaries in the real/ideal simulation paradigm [23,34]. A static semi-honest (or, honest-but-curious) adversary A corrupts either P 0 or P 1 at the beginning of the protocol and tries to learn as much as possible from the protocol execution while following the protocol specifications honestly.…”
Section: Problem Setting and Security Modelmentioning
confidence: 99%
See 3 more Smart Citations