Efficient Threshold Private Set Intersection

Threshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are ineffi...

Full description

Bibliographic Details
Main Authors: En Zhang, Jian Chang, Yu Li
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9312036/
id doaj-bdbd82b8dc804820b0a16f9789e37b86
record_format Article
spelling doaj-bdbd82b8dc804820b0a16f9789e37b862021-03-30T15:17:11ZengIEEEIEEE Access2169-35362021-01-0196560657010.1109/ACCESS.2020.30487439312036Efficient Threshold Private Set IntersectionEn Zhang0https://orcid.org/0000-0003-4106-6877Jian Chang1https://orcid.org/0000-0002-7508-198XYu Li2https://orcid.org/0000-0003-2424-896XCollege of Computer and Information Engineering, Henan Normal University, Xinxiang, ChinaCollege of Computer and Information Engineering, Henan Normal University, Xinxiang, ChinaCollege of Computer and Information Engineering, Henan Normal University, Xinxiang, ChinaThreshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all of them rely on lots of expensive public-key techniques or require an exponential number of possible combinations among the shares. In this work, we design an efficient TPSI protocol, which achieves computational security in semi-honest model. To improve the efficiency of the TPSI protocol, we design a new TPSI protocol based on garbled Bloom filter (GBF) and threshold secret sharing, which uses a small amount of public-key operations. Moreover, our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares. The performance analysis shows that our protocol is more efficient than the previous TPSI protocols. To the best of our knowledge, the optimal TPSI protocol implemented by Zhao and Chow (WPES'18) has an online time of 78 seconds to compute the intersection of two datasets of 100 elements each with threshold t = 50. In contrast, our protocol has a total time of 2.988 seconds.https://ieeexplore.ieee.org/document/9312036/Garbled bloom filtersecure multiparty computationthreshold private set intersectionthreshold secret sharing
collection DOAJ
language English
format Article
sources DOAJ
author En Zhang
Jian Chang
Yu Li
spellingShingle En Zhang
Jian Chang
Yu Li
Efficient Threshold Private Set Intersection
IEEE Access
Garbled bloom filter
secure multiparty computation
threshold private set intersection
threshold secret sharing
author_facet En Zhang
Jian Chang
Yu Li
author_sort En Zhang
title Efficient Threshold Private Set Intersection
title_short Efficient Threshold Private Set Intersection
title_full Efficient Threshold Private Set Intersection
title_fullStr Efficient Threshold Private Set Intersection
title_full_unstemmed Efficient Threshold Private Set Intersection
title_sort efficient threshold private set intersection
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description Threshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all of them rely on lots of expensive public-key techniques or require an exponential number of possible combinations among the shares. In this work, we design an efficient TPSI protocol, which achieves computational security in semi-honest model. To improve the efficiency of the TPSI protocol, we design a new TPSI protocol based on garbled Bloom filter (GBF) and threshold secret sharing, which uses a small amount of public-key operations. Moreover, our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares. The performance analysis shows that our protocol is more efficient than the previous TPSI protocols. To the best of our knowledge, the optimal TPSI protocol implemented by Zhao and Chow (WPES'18) has an online time of 78 seconds to compute the intersection of two datasets of 100 elements each with threshold t = 50. In contrast, our protocol has a total time of 2.988 seconds.
topic Garbled bloom filter
secure multiparty computation
threshold private set intersection
threshold secret sharing
url https://ieeexplore.ieee.org/document/9312036/
work_keys_str_mv AT enzhang efficientthresholdprivatesetintersection
AT jianchang efficientthresholdprivatesetintersection
AT yuli efficientthresholdprivatesetintersection
_version_ 1724179794729369600