TY - GEN
T1 - Secure Outsourced Private Set Intersection with Linear Complexity
AU - Kumar Debnath, Sumit
AU - Sakurai, Kouchi
AU - Dey, Kunal
AU - Kundu, Nibedita
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/1/30
Y1 - 2021/1/30
N2 - In the context of privacy preserving protocols, Private Set Intersection (PSI) plays an important role due to their wide applications in recent research community. In general, PSI involves two participants to securely determine the intersection of their respective input sets, not beyond that. These days, in the context of PSI, it is become a common practice to store datasets in the cloud and delegate PSI computation to the cloud on outsourced datasets, similar to secure cloud computing. We call this outsourced PSI as OPSI. In this paper, we design a new construction of OPSI in malicious setting under the Decisional Diffie-Hellman (DDH) assumption without using any random oracle. In particular, our OPSI is the first that incurs linear complexity in malicious environment with not-interactive setup. Further, we employ a random permutation to extend our OPSI to its cardinality variant OPSI-CA. In this case, all the properties remain unchanged except that the adversarial model is semi-honest instead of malicious.
AB - In the context of privacy preserving protocols, Private Set Intersection (PSI) plays an important role due to their wide applications in recent research community. In general, PSI involves two participants to securely determine the intersection of their respective input sets, not beyond that. These days, in the context of PSI, it is become a common practice to store datasets in the cloud and delegate PSI computation to the cloud on outsourced datasets, similar to secure cloud computing. We call this outsourced PSI as OPSI. In this paper, we design a new construction of OPSI in malicious setting under the Decisional Diffie-Hellman (DDH) assumption without using any random oracle. In particular, our OPSI is the first that incurs linear complexity in malicious environment with not-interactive setup. Further, we employ a random permutation to extend our OPSI to its cardinality variant OPSI-CA. In this case, all the properties remain unchanged except that the adversarial model is semi-honest instead of malicious.
UR - http://www.scopus.com/inward/record.url?scp=85101711203&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85101711203&partnerID=8YFLogxK
U2 - 10.1109/DSC49826.2021.9346230
DO - 10.1109/DSC49826.2021.9346230
M3 - Conference contribution
AN - SCOPUS:85101711203
T3 - 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021
BT - 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021
Y2 - 30 January 2021 through 2 February 2021
ER -