Publication: Enabling Two-Party Secure Computation on Set Intersection
| dc.contributor.coauthor | Karakoc, Ferhat | |
| dc.contributor.coauthor | Kupcu, Alptekin | |
| dc.date.accessioned | 2025-12-31T08:20:52Z | |
| dc.date.available | 2025-12-31 | |
| dc.date.issued | 2025 | |
| dc.description.abstract | We propose the first linear secure-computation private set intersection (PSI) protocol computing the following functionality. PX inputs a set X = {x(j)divided by 1 <= j <= nX}, whereas PY inputs a set Y = {y(i)divided by 1 <= i <= n Y} and a data set DY={(d(i)(0),d(i)(1))divided by 1 <= i <= nY}. While PY outputs nothing, PX outputs DX={d(i)(bi)divided by b(i)=1 if y(i)is an element of X,bi=0 otherwise}. This functionality is generally required when the PSI protocol is used as a part of a larger secure two-party computation protocol. Existing protocols for similar functionalities have a cuckoo table mapping in the functionality, and therefore the output is not directly indexed on the intersection but on the cuckoo table mapping of the intersection, which complicates the application of different secure computation techniques on top of the output. We introduce a conversion technique based on additively homomorphic encryption used in the construction of our PSI protocol as a separate protocol and show that it can be utilized to convert the existing circuit and secure-computation PSI protocols into the protocols realizing the functionality not having the mapping. | |
| dc.description.fulltext | Yes | |
| dc.description.harvestedfrom | Manual | |
| dc.description.indexedby | WOS | |
| dc.description.publisherscope | International | |
| dc.description.readpublish | N/A | |
| dc.description.sponsoredbyTubitakEu | TÜBİTAK | |
| dc.description.sponsorship | TUBITAK, the Scientific and Technological Research Council of Turkey [119E088]; The 1515 Frontier R&D Laboratories Program [5169902] | |
| dc.identifier.doi | 10.1109/TDSC.2025.3561472 | |
| dc.identifier.eissn | 1941-0018 | |
| dc.identifier.embargo | No | |
| dc.identifier.issn | 1545-5971 | |
| dc.identifier.issue | 5 | |
| dc.identifier.quartile | N/A | |
| dc.identifier.uri | https://doi.org/10.1109/TDSC.2025.3561472 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14288/31553 | |
| dc.identifier.volume | 22 | |
| dc.identifier.wos | 001562575700001 | |
| dc.keywords | Protocols | |
| dc.keywords | Filters | |
| dc.keywords | Computational complexity | |
| dc.keywords | Testing | |
| dc.keywords | Servers | |
| dc.keywords | Homomorphic encryption | |
| dc.keywords | Training | |
| dc.keywords | Hash functions | |
| dc.keywords | Federated learning | |
| dc.keywords | Data transfer | |
| dc.keywords | Private set intersection | |
| dc.keywords | two-party computation | |
| dc.keywords | bloom filters | |
| dc.keywords | oblivious transfer | |
| dc.keywords | cuckoo hashing | |
| dc.keywords | circuit-PSI | |
| dc.keywords | OPPRF | |
| dc.language.iso | eng | |
| dc.publisher | IEEE COMPUTER SOC | |
| dc.relation.affiliation | Koç University | |
| dc.relation.collection | Koç University Institutional Repository | |
| dc.relation.ispartof | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | |
| dc.relation.openaccess | Yes | |
| dc.rights | CC BY-NC-ND (Attribution-NonCommercial-NoDerivs) | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.subject | Computer Science | |
| dc.title | Enabling Two-Party Secure Computation on Set Intersection | |
| dc.type | Journal Article | |
| dspace.entity.type | Publication |
