Abstract
Private set intersection (PSI) allows two parties to compute the intersection of their private sets while revealing nothing except the intersection. With the development of fog computing, the need has arisen to delegate PSI on outsourced datasets to the fog. However, the existing PSI schemes are based on either fully homomorphic encryption (FHE) or pairing computation. To the best of our knowledge, FHE and pairing operations consume a huge amount of computational resource. It is therefore an untenable scenario for resource-limited clients to carry out these operations. Furthermore, these PSI schemes cannot be applied to fog computing due to some inherent problems such as unacceptable latency and lack of mobility support. To resolve this problem, we first propose a novel primitive called “faster fog-aided private set intersection with integrity preserving”, where the fog conducts delegated intersection operations over encrypted data without the decryption capacity. One of our technical highlights is to reduce the computation cost greatly by eliminating the FHE and pairing computation. Then we present a concrete construction and prove its security required under some cryptographic assumptions. Finally, we make a detailed theoretical analysis and simulation, and compare the results with those of the state-of-the-art schemes in two respects: communication overhead and computation overhead. The theoretical analysis and simulation show that our scheme is more efficient and practical.
Similar content being viewed by others
References
Abadi A, Terzis S, Dong CY, 2016. VD–PSI: verifiable delegated private set intersection on outsourced private datasets. Proc Int Conf on Financial Cryptography and Data Security, p.149–168. https://doi.org/10.1007/978-3-662-54970-4_9
Ateniese G, de Cristofaro E, Tsudik G, 2011. (If) size matters: size–hiding private set intersection. Proc Int Workshop on Public Key Cryptography, p.156–173. https://doi.org/10.1007/978-3-642-19379-8_10
Baldi P, Baronio R, de Cristofaro E, et al., 2011. Countering GATTACA: efficient and secure testing of fullysequenced human genomes. Proc 18th ACM Conf on Computer and Communications Security, p.691–702. https://doi.org/10.1145/2046707.2046785
Chen H, Laine K, Rindal P, 2017. Fast private set intersection from homomorphic encryption. Proc ACM SIGSAC Conf on Computer and Communications Security, p.1243–1255. https://doi.org/10.1145/3133956.3134061
Falk BH, Noble D, Ostrovsky R, 2018. Private Set Intersection with Linear Communication from General Assumptions. Cryptology ePrint Archive: Report 2018/238.
Freedman MJ, Nissim K, Pinkas B, 2004. Efficient private matching and set intersection. Proc Int Conf on the Theory and Applications of Cryptographic Techniques, p.1–19. https://doi.org/10.1007/978-3-540-24676-3_1
Ghosh E, Ohrimenko O, Papadopoulos D, et al., 2015. Zero–Knowledge Accumulators and Set Operations. Cryptology ePrint Archive: 2015/404.
Guan ZT, Li J, Wu LF, et al., 2017. Achieving efficient and secure data acquisition for cloud–supported Internet of Things in smart grid. IEEE Internet Things J, 4(6):1934–1944. https://doi.org/10.1109/JIOT.2017.2690522
Ion M, Kreuter B, Nergiz E, et al., 2017. Private Intersection–Sum Protocol with Applications to Attributing Aggregate Ad Conversions. Cryptology ePrint Archive: Report 2017/738.
Kamara S, Mohassel P, Raykova M, et al., 2014. Scaling private set intersection to billion–element sets. Proc Int Conf on Financial Cryptography and Data Security, p.195–215. https://doi.org/10.1007/978-3-662-45472-5_13
Kerry CF, Secretary A, Director CR, 2013. Federal Information Processing Standards Publication Digital Signature Standard (DSS), FIPS PUB 186–4. National Institute of Standards and Technology of America.
Kolesnikov V, Kumaresan R, Rosulek M, et al., 2016. Efficient batched oblivious PRF with applications to private set intersection. Proc ACM SIGSAC Conf on Computer and Communications Security, p.818–829. https://doi.org/10.1145/2976749.2978381
Kolesnikov V, Matania N, Pinkas B, et al., 2017. Practical multi–party private set intersection from symmetric–key techniques. Proc ACM SIGSAC Conf on Computer and Communications Security, p.1257–1272. https://doi.org/10.1145/3133956.3134065
Nagy M, de Cristofaro E, Dmitrienko A, et al., 2013. Do I know you?: efficient and privacy–preserving common friend–finder protocols and applications. Proc 29th Annual Computer Security Applications Conf, p.159–168. https://doi.org/10.1145/2523649.2523668
Narayanan A, Thiagarajan N, Lakhani M, et al., 2011. Location privacy via private proximity testing. Network and Distributed System Security Symp.
Nyberg K, Rueppel RA, 1994. Message recovery for signature schemes based on the discrete logarithm problem. Proc Workshop on the Theory and Application of Cryptographic Techniques, p.182–193. https://doi.org/10.1007/BFb0053434
Orrù M, Orsini E, Scholl P, 2017. Actively secure 1-out-of-N OT extension with application to private set intersection. Proc Cryptographers’ Track at the RSA Conf, p.381–396. https://doi.org/10.1007/978-3-319-52153-4_22
Papamanthou C, Tamassia R, Triandopoulos N, 2011. Optimal verification of operations on dynamic sets. 31st Annual Cryptology Conf, p.91–110. https://doi.org/10.1007/978-3-642-22792-9_6
Pinkas B, Schneider T, Zohner M, 2014. Faster private set intersection based on OT extension. Proc 23rd USENIX Conf on Security Symp, p.797–812.
Pinkas B, Schneider T, Segev G, et al., 2015. Phasing: private set intersection using permutation–based hashing. Proc 24th USENIX Conf on Security Symp, p.515–530.
Pinkas B, Schneider T, Zohner M, 2018. Scalable private set intersection based on OT extension. ACM Trans Priv Secur, 21(2):7.1–7.35. https://doi.org/10.1145/3154794
Rindal P, Rosulek M, 2017a. Improved private set intersection against malicious adversaries. Proc 36th Annual Int Conf on the Theory and Applications of Cryptographic Techniques, p.235–259. https://doi.org/10.1007/978-3-319-56620-7_9
Rindal P, Rosulek M, 2017b. Malicious–secure private set intersection via dual execution. Proc ACM SIGSAC Conf on Computer and Communications Security, p.1229–1242. https://doi.org/10.1145/3133956.3134044
Stanford University, 2013. The Pairing–Based Cryptography Library. https://doi.org/crypto.stanford.edu/pbc
Wu J, Dong MX, Ota K, et al., 2018. Big data analysis–based secure cluster management for optimized control plane in software–defined networks. IEEE Trans Netw Serv Manag, 15(1):27–38. https://doi.org/10.1109/TNSM.2018.2799000
Zhang E, Li FH, Niu B, et al., 2017. Server–aided private set intersection based on reputation. Inform Sci, 387:180–194. https://doi.org/10.1016/j.ins.2016.09.056
Zheng QJ, Xu SH, 2015. Verifiable delegated set intersection operations on outsourced encrypted data. Proc IEEE Int Conf on Cloud Engineering, p.175–184. https://doi.org/10.1109/IC2E.2015.38
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the National Natural Science Foundation of China (Nos. 61872069, 61772127, 61703088, and 61472184)
Rights and permissions
About this article
Cite this article
Wang, Q., Zhou, Fc., Ma, Tm. et al. Faster fog-aided private set intersectionwith integrity preserving. Frontiers Inf Technol Electronic Eng 19, 1558–1568 (2018). https://doi.org/10.1631/FITEE.1800518
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1800518