2017
DOI: 10.1007/978-3-662-54970-4_9
|View full text |Cite
|
Sign up to set email alerts
|

VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets

Abstract: Abstract. Private set intersection (PSI) protocols have many real world applications. With the emergence of cloud computing the need arises to carry out PSI on outsourced datasets where the computation is delegated to the cloud. However, due to the possibility of cloud misbehaviors, it is essential to verify the integrity of any outsourced datasets, and result of delegated computation. Verifiable Computation on private datasets that does not leak any information about the data is very challenging, especially w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(41 citation statements)
references
References 28 publications
0
41
0
Order By: Relevance
“…Kavousi et al proposed a PSI protocol in [19], which takes the OPRF and the garbled BF as its main components, avoiding costly operations of computation and having high scalability. e protocol in [20] allows users to store their private data sets on cloud server and also entrust computing of the intersection to the server and use homomorphic encryption (HE) and oblivious polynomial evaluation (OPE) to process the data. It greatly reduces the workload of users and improves the computational efficiency of the protocol.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kavousi et al proposed a PSI protocol in [19], which takes the OPRF and the garbled BF as its main components, avoiding costly operations of computation and having high scalability. e protocol in [20] allows users to store their private data sets on cloud server and also entrust computing of the intersection to the server and use homomorphic encryption (HE) and oblivious polynomial evaluation (OPE) to process the data. It greatly reduces the workload of users and improves the computational efficiency of the protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Performance Evaluation 6.1. eoretical Evaluation. In this section, regarding the complexity of calculation and communication, we compare the O-mPSI protocol with the protocols in [11,12,20]. We choose these three protocols because both parties of the protocols in [11,12] can know the intersection, and the protocol in [20] supports outsourcing.…”
Section: Security Analysismentioning
confidence: 99%
“…Recently, Abadi et al [9], [10] presented two delegated PSI protocols for the outsourced public cloud systems [11] based on additive homomorphic PKC and point-value set representation. In the protocols, clients encrypted their datasets by representing them as blinded polynomials independently, outsourced and stored the blinded datasets on the cloud server, and the blinded datasets could be used directly when running the protocols.…”
Section: ) Psi Based On Pkcmentioning
confidence: 99%
“…We evaluate our PSI protocol by comparing with other related PSI protocols that are PKC-based protocols [5], [10], generic protocols based protocol [14] and OT-based protocols [18], [20]. We compare these protocols in terms of four properties: simulated-based security, natural secure data storage, needing secure channel or not and runtime.…”
Section: B Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation