Efficient Secure Multiparty Subset Computation
Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2017-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2017/9717580 |
id |
doaj-ef6263589b244b5eb8fd447ac69b0a7c |
---|---|
record_format |
Article |
spelling |
doaj-ef6263589b244b5eb8fd447ac69b0a7c2020-11-25T02:28:06ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/97175809717580Efficient Secure Multiparty Subset ComputationSufang Zhou0Shundong Li1Jiawei Dou2Yaling Geng3Xin Liu4School of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Mathematic and Information Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSecure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.http://dx.doi.org/10.1155/2017/9717580 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sufang Zhou Shundong Li Jiawei Dou Yaling Geng Xin Liu |
spellingShingle |
Sufang Zhou Shundong Li Jiawei Dou Yaling Geng Xin Liu Efficient Secure Multiparty Subset Computation Security and Communication Networks |
author_facet |
Sufang Zhou Shundong Li Jiawei Dou Yaling Geng Xin Liu |
author_sort |
Sufang Zhou |
title |
Efficient Secure Multiparty Subset Computation |
title_short |
Efficient Secure Multiparty Subset Computation |
title_full |
Efficient Secure Multiparty Subset Computation |
title_fullStr |
Efficient Secure Multiparty Subset Computation |
title_full_unstemmed |
Efficient Secure Multiparty Subset Computation |
title_sort |
efficient secure multiparty subset computation |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2017-01-01 |
description |
Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols. |
url |
http://dx.doi.org/10.1155/2017/9717580 |
work_keys_str_mv |
AT sufangzhou efficientsecuremultipartysubsetcomputation AT shundongli efficientsecuremultipartysubsetcomputation AT jiaweidou efficientsecuremultipartysubsetcomputation AT yalinggeng efficientsecuremultipartysubsetcomputation AT xinliu efficientsecuremultipartysubsetcomputation |
_version_ |
1724840333232046080 |