skip to main content
10.1145/2414456.2414506acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Outsourced private set intersection using homomorphic encryption

Published: 02 May 2012 Publication History

Abstract

Private set intersection enables two parties -- a client and a server -- to compute the intersection of their respective sets without disclosing anything else. It is a fundamental operation -- equivalent to a secure, distributed database join -- and has many applications particularly in privacy-preserving law enforcement. In this paper we present a novel protocol that has linear complexity, is secure in the malicious model without random oracles, is client set size-independent and efficient. Furthermore, the computation of the intersection can be outsourced to an oblivious service provider, as in secure cloud computing. We leverage a completely novel construction for computing the intersection using Bloom filter and homomorphic encryption. For outsourcing we require and introduce a new homomorphic encryption scheme which may be of independent interest.

References

[1]
G. Ateniese, E. De Cristofaro, and G. Tsudik. (If) Size Matters: Size-Hiding Private Set Intersection. PKC, 2011.
[2]
J. Camenisch, and G. Zaverucha. Private Intersection of Certified Sets. FC, 2009.
[3]
D. Dachman-Soled, T. Malkin, M. Raykova, and Moti Yung. Efficient Robust Private Set Intersection. ACNS, 2009.
[4]
E. De Cristofaro, J. Kim, and G. Tsudik. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. ASIACRYPT, 2010.
[5]
E. De Cristofaro, and G. Tsudik. Practical Private Set Intersection Protocols with Linear Complexity. FC, 2010.
[6]
M. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. EUROCRYPT, 2004.
[7]
C. Hazay, and Y. Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. TCC, 2008.
[8]
C. Hazay, and K. Nissim. Efficient Set Operations in the Presence of Malicious Adversaries. PKC, 2010.
[9]
S. Jarecki, and X. Liu. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. TCC, 2009.
[10]
L. Kissner, and D. Song. Privacy-Preserving Set Operations. CRYPTO, 2005.

Cited By

View all
  • (2025)Non-interactive set intersection for privacy-preserving contact tracingJournal of Systems Architecture10.1016/j.sysarc.2024.103307158(103307)Online publication date: Jan-2025
  • (2024)NEW THRESHOLD PRIVATE SET INTERSECTION PROTOCOLSMugla Journal of Science and Technology10.22531/muglajsci.1387499Online publication date: 4-Apr-2024
  • (2024)Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin BoardIEEE Transactions on Services Computing10.1109/TSC.2024.338025817:4(1698-1711)Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
May 2012
119 pages
ISBN:9781450316484
DOI:10.1145/2414456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2012

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ASIA CCS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)63
  • Downloads (Last 6 weeks)6
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Non-interactive set intersection for privacy-preserving contact tracingJournal of Systems Architecture10.1016/j.sysarc.2024.103307158(103307)Online publication date: Jan-2025
  • (2024)NEW THRESHOLD PRIVATE SET INTERSECTION PROTOCOLSMugla Journal of Science and Technology10.22531/muglajsci.1387499Online publication date: 4-Apr-2024
  • (2024)Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin BoardIEEE Transactions on Services Computing10.1109/TSC.2024.338025817:4(1698-1711)Online publication date: Jul-2024
  • (2024) Prism: Pr ivacy-Preserving and Ver i fiable S et Computation Over M ulti-Owner Secret Shared Outsourced Databases IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327935621:3(1355-1371)Online publication date: May-2024
  • (2024)Quantum Secure Disease Surveillance Through Private Set IntersectionIEEE Transactions on Consumer Electronics10.1109/TCE.2024.343586070:3(5585-5596)Online publication date: Aug-2024
  • (2024)Cloud-Assisted Laconic Private Set Intersection CardinalityIEEE Transactions on Cloud Computing10.1109/TCC.2024.336188212:1(295-305)Online publication date: Jan-2024
  • (2024)Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSIIEEE Internet of Things Journal10.1109/JIOT.2024.335002911:9(15855-15868)Online publication date: 1-May-2024
  • (2024)Efficient Secure Cardinality Query Based on Private Set Intersection2024 2nd International Conference on Intelligent Control and Computing (IC&C)10.1109/IC-C62826.2024.00011(25-31)Online publication date: 29-Mar-2024
  • (2024)A lightweight delegated private set intersection cardinality protocolComputer Standards & Interfaces10.1016/j.csi.2023.10376087(103760)Online publication date: Jan-2024
  • (2024)Optimized verifiable delegated private set intersection on outsourced private datasetsComputers & Security10.1016/j.cose.2024.103822(103822)Online publication date: Mar-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media