Abstract
Private Set-Intersection (PSI) is one of the most popular and practically relevant secure two-party computation (2PC) tasks. Therefore, designing special-purpose PSI protocols (which are more efficient than generic 2PC solutions) is a very active line of research. In particular, a recent line of work has proposed PSI protocols based on oblivious transfer (OT) which, thanks to recent advances in OT-extension techniques, is nowadays a very cheap cryptographic building block.
Unfortunately, these protocols cannot be plugged into larger 2PC applications since in these protocols one party (by design) learns the output of the intersection. Therefore, it is not possible to perform secure post-processing of the output of the PSI protocol.
In this paper we propose a novel and efficient OT-based PSI protocol that produces an “encrypted” output that can therefore be later used as an input to other 2PC protocols. In particular, the protocol can be used in combination with all common approaches to 2PC including garbled circuits, secret sharing and homomorphic encryption. Thus, our protocol can be combined with the right 2PC techniques to achieve more efficient protocols for computations of the form z = f(X ∩ Y ) for arbitrary functions f.
Unfortunately, these protocols cannot be plugged into larger 2PC applications since in these protocols one party (by design) learns the output of the intersection. Therefore, it is not possible to perform secure post-processing of the output of the PSI protocol.
In this paper we propose a novel and efficient OT-based PSI protocol that produces an “encrypted” output that can therefore be later used as an input to other 2PC protocols. In particular, the protocol can be used in combination with all common approaches to 2PC including garbled circuits, secret sharing and homomorphic encryption. Thus, our protocol can be combined with the right 2PC techniques to achieve more efficient protocols for computations of the form z = f(X ∩ Y ) for arbitrary functions f.
Original language | English |
---|---|
Title of host publication | Security and Cryptography for Networks |
Subtitle of host publication | 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings |
Publisher | Springer |
Pages | 464–482 |
Number of pages | 19 |
ISBN (Electronic) | 978-3-319-98113-0 |
ISBN (Print) | 978-3-319-98112-3 |
DOIs | |
Publication status | Published - 3 Aug 2018 |
Event | 11th Conference on Security and Cryptography for Networks - Amalfi, Italy Duration: 5 Sept 2018 → 7 Sept 2018 http://scn.di.unisa.it/index.shtml |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer, Cham |
Volume | 11035 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 11th Conference on Security and Cryptography for Networks |
---|---|
Abbreviated title | SCN 2018 |
Country/Territory | Italy |
City | Amalfi |
Period | 5/09/18 → 7/09/18 |
Internet address |