Publication:
Enabling Two-Party Secure Computation on Set Intersection

dc.contributor.coauthorKarakoc, Ferhat
dc.contributor.coauthorKupcu, Alptekin
dc.date.accessioned2025-12-31T08:20:52Z
dc.date.available2025-12-31
dc.date.issued2025
dc.description.abstractWe propose the first linear secure-computation private set intersection (PSI) protocol computing the following functionality. PX inputs a set X = {x(j)divided by 1 <= j <= nX}, whereas PY inputs a set Y = {y(i)divided by 1 <= i <= n Y} and a data set DY={(d(i)(0),d(i)(1))divided by 1 <= i <= nY}. While PY outputs nothing, PX outputs DX={d(i)(bi)divided by b(i)=1 if y(i)is an element of X,bi=0 otherwise}. This functionality is generally required when the PSI protocol is used as a part of a larger secure two-party computation protocol. Existing protocols for similar functionalities have a cuckoo table mapping in the functionality, and therefore the output is not directly indexed on the intersection but on the cuckoo table mapping of the intersection, which complicates the application of different secure computation techniques on top of the output. We introduce a conversion technique based on additively homomorphic encryption used in the construction of our PSI protocol as a separate protocol and show that it can be utilized to convert the existing circuit and secure-computation PSI protocols into the protocols realizing the functionality not having the mapping.
dc.description.fulltextYes
dc.description.harvestedfromManual
dc.description.indexedbyWOS
dc.description.publisherscopeInternational
dc.description.readpublishN/A
dc.description.sponsoredbyTubitakEuTÜBİTAK
dc.description.sponsorshipTUBITAK, the Scientific and Technological Research Council of Turkey [119E088]; The 1515 Frontier R&D Laboratories Program [5169902]
dc.identifier.doi10.1109/TDSC.2025.3561472
dc.identifier.eissn1941-0018
dc.identifier.embargoNo
dc.identifier.issn1545-5971
dc.identifier.issue5
dc.identifier.quartileN/A
dc.identifier.urihttps://doi.org/10.1109/TDSC.2025.3561472
dc.identifier.urihttps://hdl.handle.net/20.500.14288/31553
dc.identifier.volume22
dc.identifier.wos001562575700001
dc.keywordsProtocols
dc.keywordsFilters
dc.keywordsComputational complexity
dc.keywordsTesting
dc.keywordsServers
dc.keywordsHomomorphic encryption
dc.keywordsTraining
dc.keywordsHash functions
dc.keywordsFederated learning
dc.keywordsData transfer
dc.keywordsPrivate set intersection
dc.keywordstwo-party computation
dc.keywordsbloom filters
dc.keywordsoblivious transfer
dc.keywordscuckoo hashing
dc.keywordscircuit-PSI
dc.keywordsOPPRF
dc.language.isoeng
dc.publisherIEEE COMPUTER SOC
dc.relation.affiliationKoç University
dc.relation.collectionKoç University Institutional Repository
dc.relation.ispartofIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
dc.relation.openaccessYes
dc.rightsCC BY-NC-ND (Attribution-NonCommercial-NoDerivs)
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectComputer Science
dc.titleEnabling Two-Party Secure Computation on Set Intersection
dc.typeJournal Article
dspace.entity.typePublication

Files