Abstract
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about components that are not in the intersection. Due to the broad range of computational resources that the cloud can provide for its users, determining the set intersection by cloud may decrease the computational cost of the users. The proposed protocol by Abadi et al. is one of the introduced protocols in this context. In this paper, we show that their protocol is vulnerable against man in the middle attack and the collusion between the cloud and one of the communicating parties. Also, a solution will be proposed to secure the protocol against mentioned attacks.
Original language | English |
---|---|
Title of host publication | The 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) |
Place of Publication | Shiraz, Iran, Iran |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Number of pages | 5 |
ISBN (Electronic) | 978-1-5386-6560-2 |
ISBN (Print) | 978-1-5386-6561-9 |
DOIs | |
Publication status | Published - 11 Oct 2018 |
Event | 14th International ISC Conference on Information Security and Cryptology - Shiraz University, Shiraz, Iran, Islamic Republic of Duration: 6 Sep 2017 → 7 Sep 2017 http://iscisc2017.shirazu.ac.ir/en/index |
Publication series
Name | |
---|---|
Publisher | IEEE |
ISSN (Print) | 2475-2363 |
ISSN (Electronic) | 2475-2371 |
Conference
Conference | 14th International ISC Conference on Information Security and Cryptology |
---|---|
Abbreviated title | ISCISC 2017 |
Country/Territory | Iran, Islamic Republic of |
City | Shiraz |
Period | 6/09/17 → 7/09/17 |
Internet address |