Publication:
Linear complexity private set intersection for secure two-party protocols

dc.contributor.coauthorKarakoç, Ferhat
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokid168060
dc.date.accessioned2024-11-09T13:18:55Z
dc.date.issued2020
dc.description.abstractIn this paper, we propose a new private set intersection (PSI) protocol with bi-oblivious data transfer that computes the following functionality. The two parties (P1 and P2) input two sets of items (X and Y, respectively) and one of the parties (P2) outputs fi(bi) for each yi∈ Y, where bi is 0 or 1 depending on the truth value of yi∈ ? X and fi is defined by the other party (P1) as taking 1-bit input and outputting the party’s (P1’s) data to be transferred. This functionality is generally required when the PSI protocol is used as a part of a larger secure two-party secure computation such as threshold PSI or any function of the whole intersecting set in general. Pinkas et al. presented a PSI protocol at Eurocrypt 2019 for this functionality, which has linear complexity only in communication. While there are PSI protocols with linear computation and communication complexities in the classical PSI setting where the intersection itself is revealed to one party, to the best of our knowledge, there is no PSI protocol, which outputs a function of the membership results and satisfies linear complexity in both communication and computation. We present the first PSI protocol that outputs only a function of the membership results with linear communication and computation complexities. While creating the protocol, as a side contribution, we provide a one-time batch oblivious programmable pseudo-random function based on garbled Bloom filters. We also implemented our protocol and provide performance results.
dc.description.fulltextYES
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuTÜBİTAK
dc.description.sponsorshipScientific and Technological Research Council of Turkey (TÜBİTAK)
dc.description.versionAuthor's final manuscript
dc.formatpdf
dc.identifier.doi10.1007/978-3-030-65411-5_20
dc.identifier.embargoNO
dc.identifier.filenameinventorynoIR02609
dc.identifier.isbn9783030654108
dc.identifier.issn0302-9743
dc.identifier.linkhttps://doi.org/10.1007/978-3-030-65411-5_20
dc.identifier.quartileN/A
dc.identifier.scopus2-s2.0-85098288916
dc.identifier.urihttps://hdl.handle.net/20.500.14288/3058
dc.keywordsBloom filters
dc.keywordsCuckoo hashing
dc.keywordsOblivious transfer
dc.keywordsPrivate set intersection
dc.keywordsTwo-party computation
dc.languageEnglish
dc.publisherSpringer
dc.relation.grantno1.19E+90
dc.relation.urihttp://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/9248
dc.sourceLecture Notes in Computer Science
dc.subjectComplex networks
dc.subjectCryptography
dc.subjectData transfer
dc.titleLinear complexity private set intersection for secure two-party protocols
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authorid0000-0003-2099-2206
local.contributor.kuauthorKüpçü, Alptekin
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
9248.pdf
Size:
460.03 KB
Format:
Adobe Portable Document Format