Efficient Threshold Private Set Intersection
Threshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are ineffi...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9312036/ |
id |
doaj-bdbd82b8dc804820b0a16f9789e37b86 |
---|---|
record_format |
Article |
spelling |
doaj-bdbd82b8dc804820b0a16f9789e37b862021-03-30T15:17:11ZengIEEEIEEE Access2169-35362021-01-0196560657010.1109/ACCESS.2020.30487439312036Efficient Threshold Private Set IntersectionEn Zhang0https://orcid.org/0000-0003-4106-6877Jian Chang1https://orcid.org/0000-0002-7508-198XYu Li2https://orcid.org/0000-0003-2424-896XCollege of Computer and Information Engineering, Henan Normal University, Xinxiang, ChinaCollege of Computer and Information Engineering, Henan Normal University, Xinxiang, ChinaCollege of Computer and Information Engineering, Henan Normal University, Xinxiang, ChinaThreshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all of them rely on lots of expensive public-key techniques or require an exponential number of possible combinations among the shares. In this work, we design an efficient TPSI protocol, which achieves computational security in semi-honest model. To improve the efficiency of the TPSI protocol, we design a new TPSI protocol based on garbled Bloom filter (GBF) and threshold secret sharing, which uses a small amount of public-key operations. Moreover, our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares. The performance analysis shows that our protocol is more efficient than the previous TPSI protocols. To the best of our knowledge, the optimal TPSI protocol implemented by Zhao and Chow (WPES'18) has an online time of 78 seconds to compute the intersection of two datasets of 100 elements each with threshold t = 50. In contrast, our protocol has a total time of 2.988 seconds.https://ieeexplore.ieee.org/document/9312036/Garbled bloom filtersecure multiparty computationthreshold private set intersectionthreshold secret sharing |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
En Zhang Jian Chang Yu Li |
spellingShingle |
En Zhang Jian Chang Yu Li Efficient Threshold Private Set Intersection IEEE Access Garbled bloom filter secure multiparty computation threshold private set intersection threshold secret sharing |
author_facet |
En Zhang Jian Chang Yu Li |
author_sort |
En Zhang |
title |
Efficient Threshold Private Set Intersection |
title_short |
Efficient Threshold Private Set Intersection |
title_full |
Efficient Threshold Private Set Intersection |
title_fullStr |
Efficient Threshold Private Set Intersection |
title_full_unstemmed |
Efficient Threshold Private Set Intersection |
title_sort |
efficient threshold private set intersection |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
Threshold private set intersection (TPSI) allows a receiver to obtain the intersection when the cardinality of the intersection is greater or equal to the threshold, which has a wide range of applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all of them rely on lots of expensive public-key techniques or require an exponential number of possible combinations among the shares. In this work, we design an efficient TPSI protocol, which achieves computational security in semi-honest model. To improve the efficiency of the TPSI protocol, we design a new TPSI protocol based on garbled Bloom filter (GBF) and threshold secret sharing, which uses a small amount of public-key operations. Moreover, our protocol combines with the Reed-Solomon decoding algorithm to reconstruct the secret which is a feasible method to avoid calculating all possible combinations among the shares. The performance analysis shows that our protocol is more efficient than the previous TPSI protocols. To the best of our knowledge, the optimal TPSI protocol implemented by Zhao and Chow (WPES'18) has an online time of 78 seconds to compute the intersection of two datasets of 100 elements each with threshold t = 50. In contrast, our protocol has a total time of 2.988 seconds. |
topic |
Garbled bloom filter secure multiparty computation threshold private set intersection threshold secret sharing |
url |
https://ieeexplore.ieee.org/document/9312036/ |
work_keys_str_mv |
AT enzhang efficientthresholdprivatesetintersection AT jianchang efficientthresholdprivatesetintersection AT yuli efficientthresholdprivatesetintersection |
_version_ |
1724179794729369600 |