Efficient Secure Multiparty Subset Computation

Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset...

Full description

Bibliographic Details
Main Authors: Sufang Zhou, Shundong Li, Jiawei Dou, Yaling Geng, Xin Liu
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/9717580
id doaj-ef6263589b244b5eb8fd447ac69b0a7c
record_format Article
spelling doaj-ef6263589b244b5eb8fd447ac69b0a7c2020-11-25T02:28:06ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/97175809717580Efficient Secure Multiparty Subset ComputationSufang Zhou0Shundong Li1Jiawei Dou2Yaling Geng3Xin Liu4School of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Mathematic and Information Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSecure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.http://dx.doi.org/10.1155/2017/9717580
collection DOAJ
language English
format Article
sources DOAJ
author Sufang Zhou
Shundong Li
Jiawei Dou
Yaling Geng
Xin Liu
spellingShingle Sufang Zhou
Shundong Li
Jiawei Dou
Yaling Geng
Xin Liu
Efficient Secure Multiparty Subset Computation
Security and Communication Networks
author_facet Sufang Zhou
Shundong Li
Jiawei Dou
Yaling Geng
Xin Liu
author_sort Sufang Zhou
title Efficient Secure Multiparty Subset Computation
title_short Efficient Secure Multiparty Subset Computation
title_full Efficient Secure Multiparty Subset Computation
title_fullStr Efficient Secure Multiparty Subset Computation
title_full_unstemmed Efficient Secure Multiparty Subset Computation
title_sort efficient secure multiparty subset computation
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2017-01-01
description Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.
url http://dx.doi.org/10.1155/2017/9717580
work_keys_str_mv AT sufangzhou efficientsecuremultipartysubsetcomputation
AT shundongli efficientsecuremultipartysubsetcomputation
AT jiaweidou efficientsecuremultipartysubsetcomputation
AT yalinggeng efficientsecuremultipartysubsetcomputation
AT xinliu efficientsecuremultipartysubsetcomputation
_version_ 1724840333232046080