Combining Private Set-Intersection with Secure Two-Party Computation

Michele Ciampi, Claudio Orlandi

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Private Set-Intersection (PSI) is one of the most popular and practically relevant secure two-party computation (2PC) tasks. Therefore, designing special-purpose PSI protocols (which are more efficient than generic 2PC solutions) is a very active line of research. In particular, a recent line of work has proposed PSI protocols based on oblivious transfer (OT) which, thanks to recent advances in OT-extension techniques, is nowadays a very cheap cryptographic building block.
Unfortunately, these protocols cannot be plugged into larger 2PC applications since in these protocols one party (by design) learns the output of the intersection. Therefore, it is not possible to perform secure post-processing of the output of the PSI protocol.
In this paper we propose a novel and efficient OT-based PSI protocol that produces an “encrypted” output that can therefore be later used as an input to other 2PC protocols. In particular, the protocol can be used in combination with all common approaches to 2PC including garbled circuits, secret sharing and homomorphic encryption. Thus, our protocol can be combined with the right 2PC techniques to achieve more efficient protocols for computations of the form z = f(XY ) for arbitrary functions f.
Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks
Subtitle of host publication11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings
PublisherSpringer, Cham
Number of pages19
ISBN (Electronic)978-3-319-98113-0
ISBN (Print)978-3-319-98112-3
Publication statusPublished - 3 Aug 2018
Event11th Conference on Security and Cryptography for Networks - Amalfi, Italy
Duration: 5 Sep 20187 Sep 2018

Publication series

NameLecture Notes in Computer Science
PublisherSpringer, Cham
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference11th Conference on Security and Cryptography for Networks
Abbreviated titleSCN 2018
Internet address

Fingerprint Dive into the research topics of 'Combining Private Set-Intersection with Secure Two-Party Computation'. Together they form a unique fingerprint.

Cite this