Next Article in Journal
Robust Mixed-Rate Region-of-Interest-Aware Video Compressive Sensing for Transmission Line Surveillance Video
Next Article in Special Issue
Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences
Previous Article in Journal
Machine Learning Prediction of a Battery’s Thermal-Related Health Factor in a Battery Electric Vehicle Using Real-World Driving Data
Previous Article in Special Issue
Reliablity and Security for Fog Computing Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication

1
College of Cyber Security, Jinan University, Guangzhou 510632, China
2
Guangdong Key Laboratory of Data Security and Privacy Preserving, Guangzhou 510632, China
*
Author to whom correspondence should be addressed.
Information 2024, 15(9), 554; https://doi.org/10.3390/info15090554
Submission received: 23 April 2024 / Revised: 27 May 2024 / Accepted: 10 June 2024 / Published: 9 September 2024
(This article belongs to the Special Issue Digital Privacy and Security, 2nd Edition)

Abstract

:
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data. Traditional approaches assume similar-sized datasets and equal computational power, overlooking practical imbalances. In real-world applications, dataset sizes and computational capacities often vary, particularly in the Internet of Things and mobile scenarios where device limitations restrict computational types. Traditional PSI protocols are inefficient here, as computational and communication complexities correlate with the size of larger datasets. Thus, adapting PSI protocols to these imbalances is crucial. This paper explores unbalanced PSI scenarios where one party (the receiver) has a relatively small dataset and limited computational power, while the other party (the sender) has a large amount of data and strong computational capabilities. It introduces three innovative solutions for unbalanced PSI: an unbalanced PSI protocol based on the Cuckoo filter, an unbalanced PSI protocol based on single-cloud assistance, and an unbalanced PSI protocol based on dual-cloud assistance, with each subsequent solution addressing the shortcomings of the previous one. Depending on performance and security needs, different protocols can be employed for applications such as private contact discovery.

1. Introduction

1.1. Background

In today’s digital age, data privacy and security have become critically important issues worldwide. With technological advancements and explosive growth in data volumes, individuals and institutions face unprecedented challenges in protecting their privacy. Privacy computing technologies have emerged in response to these challenges, enabling the secure computation and analysis of data without exposing the details of personal information. This is crucial for driving data-driven innovation and services while safeguarding personal privacy and data protection.
The PSI is a key technique in the field of privacy computing. It allows two or more parties to identify the common elements in their datasets without revealing their private data. This technology is highly useful in multiple application scenarios, such as cross-institutional data cooperation, fraud detection, and private contact discovery, without compromising user privacy. It has been applied in various fields, including the genetic testing of fully sequenced human genomes [1], private contact discovery [2], and botnet detection [3].
Despite the robust privacy protection features of PSI, there is a significant limitation: the low efficiency in scenarios where dataset sizes are imbalanced. Traditional PSI schemes typically assume that participants have similarly sized datasets and computational capabilities, which is not always the case. Particularly, in scenarios where one party is a server with a large amount of data and the other one is a mobile device with limited computational power, this imbalance is pronounced. Unbalanced PSI [2,4,5,6] was proposed to address this issue by optimizing algorithms and protocol designs to enhance efficiency and feasibility between participants with different computational powers and dataset sizes.

1.2. Motivation

To overcome the drawbacks of traditional PSI in scenarios with significant disparities in dataset sizes of the participants, this paper proposes a more suitable unbalanced PSI protocol based on Cuckoo filter. However, in the unbalanced PSI protocol based on Cuckoo filter, the client-side involves complex cryptographic operations and requires managing and processing a substantial amount of filter data (it will be demonstrated in the following sections). This poses a significant computational and storage burden on resource-constrained client devices, such as smartphones or other portable devices, limiting the practicality of these technologies and potentially affecting device performance and user experience.
In light of this, the second approach in this paper considers introducing cloud computing as a solution, to leverage its robust computational and storage capabilities to alleviate the load on client devices. By outsourcing part of the computation tasks to cloud servers, the workload of the client can be significantly reduced, thereby speeding up the entire set intersection process. However, outsourcing data processing tasks to the cloud environment introduces a new problem: the risk of collusion attacks. When the cloud server colludes with one of the participants, it could threaten the privacy security of the entire scheme.
To address this challenge, the paper proposes a third, more secure design aimed at thwarting potential collusion attacks while maintaining the efficiency and practicality of unbalanced PSI. This design incorporates multiple security technologies and strategies, effectively reducing the computational and storage pressure on client devices while ensuring data privacy in the cloud environment, even in the face of collusion threats. This is crucial for advancing the development and application of unbalanced PSI technologies, providing a secure, efficient, and practical framework for future privacy-preserving computations.
Moreover, the unbalanced PSI protocols proposed in this paper are particularly suited for private contact discovery applications. This scenario requires identifying and verifying common contacts between individuals or organizations under the premise of maintaining individual privacy, which is extremely important for social networking services, emergency response coordination, and business cooperation. Using the protocols proposed in this paper, users can securely and quickly identify common contacts without disclosing their complete contact lists. This not only enhances user privacy but also facilitates complex social network analyses and emergency contact networks, while avoiding security risks associated with data breaches or improper handling.

1.3. Main Work

Overall, this paper’s research primarily addresses the shortcomings of traditional PSI protocols in unbalanced scenarios by proposing three unbalanced PSI protocols for different contexts. There is a progressive relationship between each protocol, with each new proposal improving upon the deficiencies of the previous one. Specifically, this paper introduces an unbalanced PSI protocol based on Cuckoo filter that resolves the traditional PSI protocol’s issues with unbalanced scenarios, a single-cloud assisted unbalanced PSI protocol that transfers most computational and storage tasks from the client to the cloud, and a double-cloud assisted unbalanced PSI protocol that can resist collusion attacks. In practical applications, different schemes can be selected based on varying performance and security needs.

2. Related Works

2.1. Design Framework of PSI Protocol

2.1.1. Design Framework Based on Public Key Encryption

The basic idea behind early PSI is to encrypt data elements and then perform comparison operations on the encrypted data. The most widely used technique in this method is homomorphic encryption: the sender encrypts their dataset and sends it to the receiver. The receiver processes these ciphertexts using the properties of homomorphic encryption and returns the results to the sender. The sender then decrypts these results using their own private key to obtain the intersection of the datasets. This public-key-based method generally relies on three main security assumptions [7]:
  • Based on Diffie–Hellman (DH) theory: Meadows [8] used the DH key exchange mechanism, which is based on the discrete logarithm problem, to implement a PSI protocol. In contrast, Huberman [9] and his team explored the use of elliptic curve cryptography in PSI, noting its significant advantages in security and efficiency compared to traditional discrete logarithm-based PSI methods.
  • Based on the RSA assumption: DeCristofaro and others [10] developed a semi-honest PSI protocol using RSA blind signature technology based on the integer factorization problem. Another study [11] showed that PSI schemes based on discrete logarithm cryptography demonstrated higher efficiency compared to those based on integer factorization cryptography.
  • Based on homomorphic encryption: Freedman and his team [12] innovatively represented elements as roots of polynomials and encrypted the coefficients of these polynomials using Paillier homomorphic encryption technology, combined with zero-knowledge proofs, to implement a two-party PSI protocol resistant to malicious attacks. In 2016, Freedman et al. [13] further improved computational efficiency through the ElGamal encryption mechanism and reduced the protocol’s computational complexity using Cuckoo Hash technology [7]. Abadi et al. [14] introduced a set representation method based on point-value pairs of d-degree polynomials, implemented through the Paillier encryption scheme, reducing the multiplication complexity from O( d 2 ) to O(d) [7]. Kissner and other researchers [15] adopted different polynomial representation methods, significantly reducing computational costs to be linearly proportional to the number of participants. Jarecki and others [16] used additive homomorphic encryption and zero-knowledge proofs to implement pseudorandom functions (PRF). Hazay and others [17] developed an additive homomorphic encryption scheme that supports threshold decryption for implementing multi-party semi-honest PSI protocols. Dou Jiawei and others [18] combined Paillier encryption to propose a PSI protocol based on the formula for calculating the area of triangles and rational number encoding.
Public key encryption-based PSI schemes typically feature fewer communication rounds and are suitable for environments with strong computational capabilities. However, in practice, communication bandwidth and time complexity often pose significant constraints [7].

2.1.2. Design Framework Based on Garbled Circuits

Garbled circuit technology can transform any function into a Boolean circuit, thereby securely computing the function. Early methods based on universal circuits, like the DPSZ scheme [19], demonstrated how to use arithmetic circuits to solve the set intersection problem: the circuit builder encrypts the circuit gates using a symmetric key, then creates a garbled circuit and sends it to the circuit evaluator. The evaluator decrypts specific paths in the garbled circuit to obtain the intersection results, while being unable to access other paths in the circuit. As the circuit depth increases, its construction complexity also increases. Additionally, PSI protocols based on this circuit design can also perform various symmetric function operations, such as calculating the threshold intersection, the number of intersection elements, and their sum. For adversaries under semi-honest conditions, there are two types of garbled circuits: the Yao [20] protocol and the GMW [21] protocol. Pinkas et al. [6,22,23] and Chandran et al. based on hash storage structures and GMW circuits, implemented a more efficient OPRF circuit PSI scheme through private membership tests, reducing the number of comparisons and the depth of circuit equivalence comparisons. Meanwhile, Huang [24] and others created a semi-honest secure disordered circuit PSI scheme through the combination of Yao circuits, performing equivalence tests and specific sorting on adjacent elements. Despite these advantages, these methods still require additional key calculations and communication processes, such as key exchanges between participants.

2.1.3. Design Framework Based on Oblivious Transfer

Oblivious Transfer (OT) [25] is a cryptographic protocol that allows a sender to transmit information to a receiver without revealing any private information. In the OT protocol, the sender has two options, but the receiver can only obtain information about one of them without access to the other, and the sender does not know which option the receiver has chosen. OT is widely used in many secure areas due to its cryptographic robustness and privacy features. Its applications include secure protocol negotiation, secure online auction systems, and secure voting systems. In 2013, Dong [26] et al. proposed a new data structure—the garbled Bloom filter (GBF)—and based on the GBF and OT extension, they introduced a PSI protocol. This protocol utilized efficient symmetric encryption operations and could handle billions of elements. However, this protocol faced two issues: one is that the malicious sender might send incorrect shared information, and the other is that the input datasets are not independent. To address these problems, in 2016, Rindal and Rosulek [27] proposed a new randomized garbled Bloom filter using the “cut-and-choose” technique. They successfully implemented a two-party malicious model PSI protocol. Subsequently, Zhang [28] et al., based on this scheme, further proposed and implemented a multi-party PSI protocol, ensuring malicious security in the presence of two non-colluding servers, with computational and communication costs depending on the number of participants. Pinkas et al. [29] based on the OOS17-OT [30] protocol, built a maliciously secure PSI protocol. Rindal [31] et al., based on the semi-honest secure Schoppmann et al. [32] protocol and the maliciously secure Weng et al. [33] protocol, proposed, respectively, maliciously secure and semi-honest secure PSI protocols. Overall, PSI protocols based on oblivious transfer typically feature lower computational and communication overhead.

2.2. Unbalanced PSI

In recent years, many research articles [34,35,36,37,38,39,40,41,42,43,44,45,46,47] have focused on unbalanced PSI, primarily aiming to improve communication complexity and reduce the overall runtime of the protocols. However, none of these articles have specifically addressed the issue that, in unbalanced PSI scenarios, the party with the smaller dataset is often a mobile device with limited computational and storage capabilities. The complex cryptographic operations and filter storage requirements pose a significant burden on these devices. Therefore, the focus of this article is to alleviate the computational and storage burden on the party with the smaller dataset in unbalanced PSI scenarios while ensuring adequate security conditions are met.

2.3. Private Contact Discovery

As shown in Figure 1, mobile privacy contact discovery refers to when you install a communication application such as WhatsApp on your phone; the first thing this app does is check your contact list to see which of your contacts are also using their service. To achieve this functionality, the application could simply tell the service provider about the users in your contact list. The service provider can then inform you which of these users are also using their service. A typical example is WeChat, which recommends friend accounts based on the mobile phone’s contact list. In this process, the WeChat server cross-matches the mobile numbers in the user’s contact list with its own WeChat account database, thus identifying all users in the contact list who have registered WeChat accounts, and provides friend account recommendations based on this information.
This naturally involves privacy issues, as through our contacts, many aspects of our lives can be inferred, such as spending level and home address, and more seriously, it can lead to the leakage of our entire social graph. Furthermore, if one communicates with a highly influential person who holds many secrets, attackers could also potentially access these secrets through you.
The insecure solution to the privacy contact discovery problem allows users to send their contact set to the service provider, who then performs the intersection on behalf of the users. While this protects the privacy of the service provider, it exposes the users’ private contacts to the service provider. In much research, current social media privacy contact discovery recommendation methods mainly include: (i) not offering privacy protection promises, (ii) seeking privacy protection through ambiguity (for example, using multiple signals for recommendations without explaining the reasons [48]), and (iii) using temporary thresholds to block the simplest attacks (typically, these thresholds are applied to the number of mutual friends between two users to decide whether to recommend one to the other). The only known attempt to rigorously address this issue in practice was the recent study by Signal [49], but it addressed a more limited problem than the one discussed in this paper—privately finding out whether contacts in a phonebook are Signal users. Theoretical research suggests adopting structured graph perturbation [50] and randomized recommendation methods [51,52] to achieve strict privacy guarantees of differential privacy [53]. Although differential privacy has begun to see practical application in other data mining applications [54], theoretical methods for privacy contact discovery have not yet been deployed, possibly because the trade-offs between privacy and utility they require are too harsh (i.e., they often recommend people who users are almost unlikely to know, significantly negatively impacting user experience quality). William Brendel [55] and others proposed a method using an auxiliary graph for deanonymization. Instead of modifying existing privacy contact discovery algorithms to protect privacy, they modify the graph used by the algorithm to create a candidate graph more resistant to practical brute force attacks, aiming to improve privacy with auxiliary graph information.
Some applications use a naive hashing protocol, where the client sends only the hash results of phone numbers to the service provider. Unfortunately, this technique is almost considered insecure. Because the entropy of phone numbers is low, naive hashing methods are susceptible to dictionary attacks. Generally speaking, PSI protocols are provably secure cryptographic protocols. They allow two parties to compute the intersection of their input sets without revealing any information other than the intersection. However, in mobile contact discovery scenarios, a common problem with most PSI protocols is that the online phase of the protocol, the computation of the intersection, has communication complexity linearly related to the size of the two input sets. In mobile contact discovery scenarios, the server-side database may contain millions or even billions of entries, while it is generally assumed that the client has about 1000 contacts. This makes the communication complexity of the protocol extremely high and impractical to apply.

3. Related Theories and Technologies

3.1. Multi-Party Secure Computation Security Model

The mathematical concept of Multi-Party Computation (MPC) involves several participants (such as P 1 , P 2 , , P n ), with each holding private input data ( x i ). These participants collaboratively execute a computation of the function f ( x 1 , x 2 , , x n ) with the goal of ensuring that each participant can only access their own computational results, while being unable to ascertain the inputs and results of others. There are generally two security models employed in secure multi-party computation protocols [56]:
  • Semi-honest model: In this model, participants adhere to the protocol’s execution rules but may attempt to gather other participants’ inputs, outputs, and any accessible information during the execution of the protocol. This model assumes that the participants do not deviate from the established procedural rules but will use all available information to deduce the private data of others.
  • Malicious adversary model: Unlike the semi-honest model, the malicious adversary model accounts for the possibility that attackers may manipulate a subset of the participants to perform illicit actions, such as submitting incorrect input data or maliciously altering data to steal the private information of honest participants. Malicious adversaries might also disrupt the protocol by intentionally terminating its execution or by refusing to participate, thus preventing the protocol’s completion.
The security model considered in this paper is the semi-honest security model.

3.2. Cuckoo Filter

Determining whether a particular element belongs to a given set is a common problem in computer science, with widespread applications in bioinformatics, machine learning, computer networks, the Internet of Things, and database systems [57]. Filter data structures such as Bloom filter and Cuckoo filter can approximately determine if an element is part of a specified set and have been extensively applied in network routing [58], file merging [59], spam detection [60], and distributed systems [61].
Filter data structures are used to approximately ascertain if an element belongs to a specific set. In essence, for a given set S and a query element x, the filter can approximately inform the query whether “x is in S”. “Approximately” here implies that if x is actually not in S, the filter has a small error probability p of wrongly indicating that “x is in S”; however, if x is indeed in S, the filter will always correctly return that “x is in S”. Filter data structures sacrifice some query accuracy to enhance space and time efficiency. Unlike data structures that require storing complete information of each element for precise queries, filter approximate the presence of an element solely through partial information such as hash values or “fingerprints”. Based on this principle, existing filter data structures are mainly categorized into two types: one type uses bit arrays as in Bloom filter; the other type, exemplified by Cuckoo filter, is based on element “fingerprints”.
The Cuckoo filter [62] is an advanced retrieval structure made up of multiple buckets, each capable of containing several bits. Compared to Bloom filter, Cuckoo filter offer the significant advantage of supporting deletion of elements and having higher space efficiency. With equal storage space, Cuckoo filter can achieve more accurate search results and shorter search times. When querying an element, the time complexity for Cuckoo filter is O ( 1 ) , meaning constant time complexity. This indicates that the execution time for query operations does not increase with the number of elements in the filter, an important performance feature of the Cuckoo filter design.
In this paper, Cuckoo filter are used to store data on database servers.

3.3. Paillier Homomorphic Encryption

Homomorphic encryption is an encryption technology that allows computations to be performed on encrypted data and to obtain encrypted results, which, when decrypted, are consistent with the results obtained by performing the same computations directly on the original data. This means that homomorphic encryption enables data to be processed and analyzed without revealing any content. It is an important technology for protecting online privacy, allowing cloud computing services to perform complex data processing tasks on users’ encrypted data without accessing the actual data.
Paillier homomorphic encryption is a public-key cryptosystem that specifically supports homomorphic addition operations on encrypted data. The applications of the Paillier encryption scheme are extensive, and it can be used to protect the privacy and security of data. For example, in distributed computing, the Paillier encryption scheme can be used to encrypt data and transmit it to various nodes for processing, ensuring the security and privacy of the data. Furthermore, the Paillier encryption scheme can also be used to implement homomorphic secret sharing, PSI, and other application scenarios. Overall, the Paillier encryption scheme is an efficient homomorphic encryption scheme with a wide range of application prospects. This paper uses the Paillier cryptosystem in its final scheme. The homomorphic properties utilized in this paper are as follows (the final scheme is based on these two features):
  • Additive Homomorphism: If c 1 = Enc ( m 1 ) and c 2 = Enc ( m 2 ) , then Dec ( c 1 · c 2 mod n 2 ) = m 1 + m 2 . This allows for performing addition operations on ciphertexts without needing to decrypt them first.
  • Scalar Multiplication Homomorphism: If c = Enc ( m ) , then Dec ( c k mod n 2 ) = k · m . This means that it is possible to perform multiplication operations between a ciphertext and a plaintext scalar without decryption.
This paper will utilize homomorphic encryption technology to construct the third protocol of this paper: unbalanced PSI protocol based on dual-cloud assistance.

4. PSI Protocol Constructed Based on DH Key Exchange Mechanism

Before proposing the first unbalanced PSI protocol of this paper, we introduces Meadows’ PSI protocol constructed based on the DH key exchange mechanism [8]. As shown in Figure 2, the specific process is as follows:

4.1. Protocol Process

4.1.1. Preprocessing Stage

  • Hash Processing: Each participant applies the same hash function to each element in their dataset to form a hash-processed dataset, ready for subsequent encryption and computation processes.

4.1.2. Exchange and Computation Stage

  • Exponentiation: Participant A takes each element from its dataset, use a to perform exponentiation operations (where a is A’s private key) and forms a new set.
  • Data Exchange: Participant A sends the above-computed set to Participant B.
  • Auxiliary Dataset Construction: Upon receiving the dataset from A, Participant B uses b to perform exponentiation operations (where b is B’s private key) to build an auxiliary dataset and sends the result set back to A.
  • Exponentiation: At the same time, Participant B also uses b to perform exponentiation operations of each element in its own dataset, which is also sent to A.

4.1.3. Intersection Identification Stage

  • Exponentiation and Comparison: After receiving two datasets from B, participant use a to perform exponentiation operations of the elements in the latter dataset received that has been powered by B. Then, A compares this result with another dataset received from B.
  • Intersection Determination: If an element after being powered a times matches an element in the auxiliary dataset sent by B, then that element belongs to the intersection of datasets A and B.
This protocol effectively protects the participants’ data privacy through two exponential operations and hash processing, preventing data leakage during the exchange process.

4.2. Experimental Analysis

For this protocol, experiments were conducted and the runtime was recorded for various combinations of dataset sizes, as shown in Table 1, where the dataset cardinality refers to the number of elements in the dataset.
Through the experimental data, an important phenomenon can be observed. Table 1 shows the estimated runtime of the above protocol under different data volume levels. For example: Initially, when the number of elements in Participant One’s dataset is 2 10 and Participant Two’s dataset is 2 15 , the runtime of the protocol is 1.7442 s. In this case, there is a noticeable imbalance between the smaller side (Participant One) and the larger side (Participant Two). Now, if we expand the number of elements in Participant One’s dataset (originally the side with fewer elements) to 2 15 , while keeping Participant Two’s dataset size constant at 2 15 , the runtime increases to 4.9248 s, approximately three times the original. This indicates that although the runtime increases when the datasets are balanced, the increase is limited. However, if we keep Participant One’s dataset size at 2 10 and increase Participant Two’s dataset size to 2 20 (the same scale of change), the runtime dramatically increases to 55.2655 s, about 31 times the initial condition. This phenomenon shows that in unbalanced dataset conditions, increasing the number of elements in the larger dataset significantly affects the efficiency of the protocol.
These results reveal the importance of dataset balance in maintaining efficiency during the implementation of this protocol. Unbalanced datasets not only lead to extended runtimes but can also cause low resource utilization and delays in processing. However, in practical applications, when two parties want to perform PSI, their sets are often unequal and with a significant gap. Therefore, the current situation requires the design of a new protocol to eliminate the impact of dataset size imbalance on protocol efficiency.

5. Unbalanced PSI Protocol Based on Cuckoo Filter

Although Meadows’ PSI protocol [8] constructed based on the DH key exchange mechanism provides an effective way to compute the intersection of two datasets, especially under the premise of protecting participants’ data privacy, this paper observes that its efficiency is significantly impacted when dataset sizes are extremely unbalanced. In particular, as shown in Table 1, the runtime increases significantly as the size of the larger dataset increases, reflecting the performance limitations of Meadows’ PSI protocol when dealing with unbalanced datasets.
In order to overcome these limitations, the first protocol proposed in this paper adopts a different technical strategy, which effectively reduces the computational burden under unbalanced conditions by introducing Cuckoo filter. This not only optimizes the data processing process, but also improves the overall operational efficiency. In the new protocol, the increase in run time is not as dramatic as that in the Meadows [8] PSI protocol based on the DH key exchange, even with unbalanced dataset sizes, this allows for more efficient and balanced data processing. This improvement is particularly important for datasets of different sizes frequently encountered in practical applications.
Therefore, based on the above introduction, as shown in Figure 3, this paper first proposes a one-way PSI protocol based on the discrete logarithm problem difficulty and the correctness (high false positive rate) of Cuckoo filter. This protocol is divided into two phases, the specific details of which will be introduced later, and in the subsequent sections, the specific implementation details and optimization strategies of the protocol will be thoroughly explained.

5.1. Definition of Main Participants and Related Symbols

  • database server: represents the database server that holds all user data.
  • client: represents the mobile client who wants to perform private contact discovery services.
  • X and Y represent the dataset of the database server and the client, respectively.
  • α represents the private key of the database server in the Diffie–Hellman encryption algorithm.
  • β j represents the random number generated by the client for the Diffie–Hellman encryption algorithm.
  • H represents the hash function negotiated by the client and database server for use.
  • C F represents Cuckoo Filter, C F . i n s e r t represents the operation of adding an element to the Cuckoo filter, C F . c h e c k represents the operation of checking whether a specific element exists in the filter.
  • X i represents the i-th element of set X. Similarly, Y i , C i , etc., also represent similar meanings.
  • C = { c 1 , c 2 , , c n } represents the set containing n 2 ciphertexts sent by the client to the database server.
  • C represents the set containing n 2 ciphertexts sent by the database server to the client.
  • i t e m j represents the result obtained through a series of exchange and decryption operations, used to retrieve the filter to obtain the intersection.

5.2. Protocol Process

The protocol is divided into two phases: the preprocessing phase and the intersection phase, with specific details as follows.

5.2.1. Preprocessing

In the preprocessing phase, the client and server need to perform a series of preparatory work to ensure the security and efficiency of subsequent interactions. The specific steps are as follows:
  • Security parameter negotiation: The client and database server agree on the large prime number q used in the DH encryption algorithm and the hash function H used.
  • Database server generates private key: The database server generates its own private key α , used for the Diffie–Hellman (DH) encryption algorithm.
  • Data scrambling: The client and database server scramble their own datasets X and Y for randomization, enhancing data privacy and security.
  • Client data preprocessing: The client calculates h j = H ( y j ) and generates n 2 random numbers β j , used for the Diffie–Hellman (DH) encryption algorithm.
  • Creation of Cuckoo filter: The database server generate a Cuckoo filter C F by using the operation C F . i n s e r t ( ( H ( x i ) ) α ) , and sends the filter C F to the client for PSI queries with privacy protection.

5.2.2. Intersection

In the intersection phase, the client and database server perform a series of carefully designed encryption and decryption operations to blind the client’s elements securely and compute the intersection of the two sets. The specific operations are as follows:
  • Element blinding and interactive encryption operations: The client and the database server interact through a series of asymmetric encryption and decryption operations to blind the client’s elements. Specifically, the client calculates C j = h j β   j and sends C to the database server. The database server uses its private key α to compute C j = C j α and sends C back to the client.
  • Intersection computation: After receiving C , the client checks whether they belong to the filter C F through the check operation C F . c h e c k , thereby calculating the intersection of the sets. Specifically, after receiving C sent by the database server, the client computes i t e m j = C j 1 / β j and uses the result to query the filter C F to obtain the intersection element y j .

5.3. Correctness Analysis

If x i = y j , then H ( x i ) = H ( y j ) , then i t e m j = C j 1 / β j = C j α 1 / β j = h j β j 1 / β j α = h j α = H ( x i ) α = H ( y j ) α .
Thus, through this scheme, the client can accurately obtain the intersection elements of both parties.

5.4. Security Analysis

This section will analyze the security of the protocol in detail, mainly its ability to protect the privacy of both parties.
Firstly, considering that the protocol utilizes the Diffie–Hellman (DH) key exchange mechanism to blind the client’s elements, this process’s security is based on the difficulty of solving the One-More-Gap-Diffie–Hellman (OMGDH) problem. Since the DH mechanism ensures that, even in public communication channels, unauthorized parties cannot decipher the exchanged secret information, the client’s data are protected during transmission to the server. The server uses a private key to process the received data and returns the results to the client; this process likewise ensures the security and privacy of the data server.
Secondly, the protocol’s use of Cuckoo filter means that although it efficiently supports insertion and query operations, its false positive characteristics mean that even if some non-intersecting elements are mistakenly identified as belonging to the intersection, it does not reveal the exact set membership information. This feature provides additional privacy protection to some extent, as even in the event of a false positive error, attackers cannot determine whether a specific element truly exists in the other party’s set.
Furthermore, through the interactive computations between the client and the server, the protocol ensures that only elements common to both parties can be accurately identified. The client checks the data returned by the server against its own dataset to ultimately determine the intersection.
In summary, based on the blinding process using the Diffie–Hellman mechanism and the use of Cuckoo filter, this protocol can accurately calculate the intersection of two sets while protecting the participants’ privacy.

5.5. Experimental Analysis

For this protocol, experiments were conducted, and the runtime was recorded for various combinations of data volumes, as shown in Table 2. The table also compares the runtime of Meadows’ PSI protocol constructed based on the DH key exchange mechanism [8]. Since preprocessing can be completed offline, the runtime of the unbalanced PSI protocol based on Cuckoo filter refers to the total time of the outsourcing process and the intersection process. The original protocol refers to the PSI protocol constructed based on the DH key exchange mechanism, and the new protocol refers to the unbalanced PSI protocol based on Cuckoo filter.
Through the experimental data, this paper can observe several key phenomena. First, when the cardinality of the smaller dataset (number of elements) remains constant while the number of elements in the larger dataset increases rapidly, it is observed that the runtime of the protocol does not change much, remaining consistent. This indicates that although the size of the large dataset increases dramatically, the efficiency of the protocol is not significantly affected, thereby proving that the design of this protocol can effectively mitigate the negative impact of dataset size imbalance on protocol efficiency. Especially, the overall runtime of the protocol is more related to the cardinality of the smaller dataset and has very low relevance to the cardinality of the larger dataset.
At the same time, this experiment also found that under balanced dataset conditions, the runtime of the PSI protocol based on the DH key exchange mechanism and the unbalanced PSI protocol based on Cuckoo filter does not differ significantly. This indicates that when the sizes of the sets are similar, both protocols can exhibit comparable performance, providing an efficient data intersection solution.

5.6. Summary of This Chapter

In this chapter, two types of PSI protocols are discussed in detail: the PSI protocol constructed based on the DH key exchange mechanism [8] and the unbalanced PSI protocol based on Cuckoo filter. By comparing the runtime of these two protocols under different data volume conditions, this chapter has obtained a series of important observations and conclusions.
First, the PSI protocol based on DH key exchange shows a performance decline when dealing with imbalanced datasets. Especially when the size of the smaller dataset remains constant while the size of the larger dataset increases significantly, the runtime of this protocol increases dramatically, showing efficiency issues when processing large datasets.
In contrast, the unbalanced PSI protocol based on Cuckoo filter exhibits more stable performance under various conditions of dataset size imbalance. Even when the size of the large dataset increases significantly, the change in runtime for this protocol is not substantial, proving its superiority in dealing with unbalanced datasets. Additionally, when the datasets are nearly balanced, the performance difference between the two protocols is not significant, indicating that both protocols can work effectively under balanced dataset conditions.
Therefore, facing settings with dataset imbalance, the unbalanced PSI protocol based on Cuckoo filter appears more efficient. It not only maintains a relatively stable runtime in situations where the dataset sizes are extremely unbalanced but also exhibits performance comparable to the PSI protocol based on DH key exchange even when the dataset sizes are similar. This robustness makes the unbalanced PSI protocol based on Cuckoo filter a more ideal choice when facing the common problem of dataset imbalance in practical applications.

6. Unbalanced PSI Protocol Based on Single-Cloud Assistance

The previous chapter has proven that the unbalanced PSI protocol based on Cuckoo filter is more suitable for practical scenarios; especially under unbalanced conditions, this protocol effectively resolves the performance limitations of the PSI protocol constructed using the DH key exchange mechanism in handling unbalanced datasets. However, there is still room for improvement in this protocol. It is observed that in this protocol, clients need to store filter and perform complex cryptographic operations, which can be a significant burden for mobile devices with limited computing power and storage space. A series of encryption operations and storing filter received from the other party becomes a heavy load. To address this issue, it is considered to transfer most of the client’s computational and storage tasks to cloud servers. By delegating tasks to cloud servers, clients can significantly reduce computational and storage pressure, especially for mobile devices with limited capabilities.
This section will introduce cloud computing technology, which allows clients with limited computing power and storage space to outsource their private data and request cloud platforms to perform related computations. Currently, whether for individual users or large enterprises, entrusting data storage and computation tasks to cloud services has become a common practice. Based on the introduction above, as shown in Figure 4, this chapter proposes a second unbalanced PSI scheme based on the unbalanced PSI protocol using Cuckoo filter.

6.1. Definition of Main Participants and Related Symbols

  • database server: represents the database server that holds all user data.
  • client: represents a mobile client that wants to discover private contacts.
  • cloud server: represents an auxiliary server that assists the client in performing intersection operations, undertaking most of the computational and storage pressures.
  • X and Y, respectively, represent the dataset of the database server and the client dataset.
  • α represents the private key of the database server in the Diffie–Hellman encryption algorithm.
  • r 1 represents the random number generated by the client, used to blind the data.
  • β j represents the random number generated by the client for the Diffie–Hellman encryption algorithm.
  • H represents the hash function negotiated for use by the client and database server.
  • C F represents the Cuckoo Filter, C F . i n s e r t represents the operation to add an element to the Cuckoo filter, C F . c h e c k represents the operation to check if a specified element exists in the filter.
  • X i represents the i-th element of the set X. Similarly, Y i , C i , etc., also represent similar meanings.
  • C = { c 1 , c 2 , , c n } represents the set of n 2 ciphertexts sent by the client to the database server.
  • C represents the set of n 2 ciphertexts sent by the database server to the client.
  • i t e m j represents the result obtained through a series of exchange and decryption operations, used to retrieve the filter to obtain the intersection.

6.2. Protocol Process

6.2.1. Preprocessing

  • Security parameter negotiation: Each role discusses the necessary security parameters—all parties share the large prime q used in the DH cryptographic algorithm. The client and database server negotiate to generate r 1 and the hash function H.
  • Database server generates a private key: The database server generates its own private key α , for use in the Diffie–Hellman encryption algorithm.
  • Data scrambling: The client and database server each scramble their own datasets X and Y.
  • Client data preprocessing: The client calculates h j = H ( y j ) , generates n 2 random numbers β j , and calculates h j r 1 .

6.2.2. Outsourcing

  • Database server sends data to the cloud server: The database server uses its private key α to perform the operation C F . i n s e r t ( ( H ( x i ) ) α r 1 α ) , creates a Cuckoo filter C F , and sends it to the cloud server.
  • Client sends data to the cloud server: The client sends the random numbers β j and h j r 1 to the cloud server. After receiving the data sent by the client, the cloud server calculates C j = r 1 β j h j β j . At this point, the cloud server has saved the client’s blinded data.

6.2.3. Intersection

  • Cloud server sends data: The client cloud server sends the blinded data C j to the database server.
  • Database server processes data: Upon receiving C j , the database server uses its private key α to calculate C j = C j α , and sends the result back to the cloud server.
  • Cloud server processes data: After receiving C j from the database server, the cloud server calculates i t e m j = C j 1 / β j and uses the result to search C F . If i t e m j exists in C F , it returns the index j of i t e m j and sends j to the client.
  • Obtaining the intersection: The client obtains the intersection element y j through the received index j.

6.3. Correctness Analysis

If x i = y j , then H ( x i ) = H ( y j ) , so i t e m j = C j 1 / β j = C j α 1 / β j = r 1 β j h j β j 1 / β j α = r 1 α h j α = r 1 α H ( x i ) α = r 1 α H ( y j ) α .
Thus, through this scheme, the client can accurately obtain the intersection elements of both parties.

6.4. Security Analysis

In the design of this protocol, the primary security objective is to ensure that, even in a partially trusted cloud environment, neither the client’s data nor the database server’s data can be accessed or inferred by unauthorized entities. Specifically, since other participating parties are unaware of the database server’s private key α , they cannot deduce the data held by the database server. Similarly, since other parties do not know the client’s private random number r 1 , they cannot deduce the client’s data.
However, this scheme has inherent security risks, primarily because it does not withstand collusion attacks. If the data server and the cloud server collude, they can jointly deduce the client’s data. This is possible because the cloud server possesses the blinded data h j × r 1 , and if the data server leaks the private key r 1 to the cloud server, then both the cloud server and the database server could deduce the client’s original data h j . Collusion attacks are a security threat where two or more distinct entities (for example, users, systems, or service providers) secretly cooperate to undermine or circumvent security mechanisms and privacy measures. In cloud computing environments, cloud service providers and cloud users may collude to steal or infer other users’ sensitive data stored on the cloud.

6.5. Experimental Analysis

6.5.1. Data Storage Volume

In the research of this paper, the experimental analysis of the unbalanced PSI protocol based on single-cloud assistance revealed a key issue: when the client needs to receive a Cuckoo filter from the database server, this poses a significant challenge for mobile clients with limited storage capacity. This challenge is magnified when facing large datasets.
To understand this issue deeply, a series of experiments were conducted to measure the volume of Cuckoo filter needed by the client under different data sizes. The input data size for the experiments was provided by the database server, reflecting the various data volumes that might be encountered in actual application scenarios. As shown in Table 3, the paper meticulously recorded the specific sizes of Cuckoo filter under different input data volumes, revealing the intrinsic relationship between data volume and filter size. Through experiments, it was discovered that as the data volume in the database server increased, the storage burden on the client under the original protocol also increased accordingly, with the size of the Cuckoo filter directly impacted by the input data volume. In applications highly dependent on contact discovery services and containing extensive user information, this storage pressure is particularly evident. For example, for applications containing hundreds of millions of data entries, the volume of the Cuckoo filter could reach an overwhelming 14.850 GB, a significant challenge for most mobile devices.
However, the proposed protocol based on cloud assistance significantly alleviates this pressure. In the protocol, the Cuckoo filter is stored on the cloud server, thereby avoiding direct data transmission to the client. This approach not only effectively reduces the client’s storage burden but also maintains the system’s efficient operation, especially when handling large-scale data. By making such system design adjustments, the paper not only ensures the protection of data privacy but also significantly improves the feasibility and practicality of contact discovery services in actual applications.
In summary, the experimental results of this chapter emphasize the importance of optimizing storage strategies when dealing with large data scenarios. By outsourcing some storage tasks to the cloud server, the solution proposed in this chapter offers a viable approach for mobile clients needing to perform private contact discovery services, addressing the growing demands for data storage.
Therefore, based on the above analysis and experimental results, it is clear that when the data volume in the database server is excessively large, in other words, when the number of users reaches a certain level, the feasibility of a simple unassisted unbalanced PSI protocol based on Cuckoo filter significantly decreases, especially in applications like private contact discovery. This is because the unbalanced PSI protocol based on Cuckoo filter requires clients to directly receive and process massive Cuckoo filter, which poses a significant challenge for clients with limited storage resources, particularly mobile devices. Client devices often do not have enough storage space to accommodate these large-volume filter data, let alone process these data to complete PSI operations.
In this context, the introduction of a cloud server scheme shows its unique advantages. By transferring the storage of the filter to the cloud server, the burden on the client is greatly reduced. By this means, even in situations with a massive number of users and large data volumes, the scheme can still maintain efficient operations and ensure the smooth completion of PSI operations.
In summary, through experimental and theoretical analysis, this section concludes that in scenarios with large-scale users and massive data volumes, the introduction of a cloud server scheme is more feasible and efficient than the unbalanced PSI protocol based on Cuckoo filter.

6.5.2. Protocol Running Time

For this protocol, as shown in Table 4, the paper conducted experiments and recorded the running time of the protocol under various data volume combinations. Because preprocessing can be completed offline, the running time of the protocol refers to the total time of the outsourcing process and the intersection process. Table 4 also compares the running times of the unbalanced PSI protocol based on Cuckoo filter and the unbalanced PSI protocol based on single-cloud assistance. Here, Protocol 1 refers to the unbalanced PSI protocol based on Cuckoo filter, and Protocol 2 refers to unbalanced PSI protocol based on single-cloud assistance.
From the experimental analysis, the following conclusions can be drawn: In cases of smaller data volumes, the performance differences between the two protocols are not significant. However, as the data volume increases, the running time differences between different protocols gradually become apparent. This is because, at certain specific levels, the proportion of communication time is relatively high when the data volume is small, significantly impacting the results. For larger data volumes, where computation time dominates, Protocol 2, by placing computational tasks on the more powerful cloud server, gradually widens the running time difference from Protocol 1. Overall, the use of cloud resources in the unbalanced PSI protocol based on single-cloud assistance significantly reduces running times, especially when dealing with large-scale datasets.

6.6. Summary of This Chapter

This chapter introduces an unbalanced PSI protocol based on single-cloud assistance, which utilizes cloud computing to reduce the computing and storage pressure of the client compared with previous protocols. Additionally, in the absence of collusion between the data server and the cloud server, the protocol effectively protects data from unauthorized access, ensuring the confidentiality of the data and the privacy of the client, making it highly suitable for scenarios where the cloud server is fully trusted.
However, it cannot be denied that although this scheme significantly reduces the computational and storage burden on the client, its security against collusion attacks is insufficient. When the possibility of collusion between the cloud server and data server cannot be completely ruled out, the protocol faces security risks and will require further security enhancement measures. Therefore, the next chapter will introduce a more secure solution to address the security deficiencies of the current scheme, ensuring the security and privacy of client data and database server data in environments where not all parties are fully trustworthy. In other words, the new scheme can resist collusion attacks.

7. Unbalanced PSI Protocol Based on Dual-Cloud Assistance

The previous single-server solution, which efficiently delegated computationally intensive encryption operations such as exponentiation and storage-intensive Cuckoo filter to the cloud server, has indeed alleviated the computational and storage burdens on the client to a certain extent. This is particularly advantageous for clients with limited computing and storage capabilities, allowing them to operate beyond their hardware constraints. However, security analysis reveals that the unbalanced PSI protocol based on single-cloud assistance has inherent security risks, specifically when collusion between the cloud and data servers is possible, thus compromising its adequacy in protecting client data privacy.
As shown in Figure 5, to preserve the advantages of the previous scheme—namely reducing computational and storage pressures on the client—while addressing these security issues, this chapter proposes a new solution. This design aims to enhance the security during data processing, especially against potential collusion attacks.

7.1. Definition of Main Participants and Related Symbols

  • database server: represents the database server that holds all user data.
  • client: represents the mobile client that wishes to perform private contact discovery services.
  • cloud server H 1 : acts as an auxiliary server for the client, handling the majority of computation and storage pressures.
  • cloud server H 2 : another auxiliary server handling substantial computational and storage demands.
  • X and Y: represent the dataset of the database server and the client, respectively.
  • α : represents the private key of the database server used in the Diffie–Hellman encryption algorithm.
  • H: the hash function agreed upon by the client and the database server for use.
  • C F : represents the Cuckoo Filter, where C F . i n s e r t denotes the operation to add elements, and C F . c h e c k checks for the presence of specific elements.
  • ω j : random exponentials generated by the client for cloud server H 1 , β j for cloud server H 2 .
  • a: a secret value held by the client.h
  • r 1 , j : random numbers used by the client for sending obfuscated data to cloud server H 1 , and r 2 , j for H 2 where r 1 , j + r 2 , j = a .
  • C 1 : the ciphertext collection sent from cloud server H 1 to the database server, and C 2 from H 2 ; C 1 , j and C 2 , j are specific elements within these collections.
  • C 1 and C 2 : processed ciphertext collections returned to H 1 and H 2 from the database server; C 1 , j and C 2 , j are specific elements within these collections.
  • C 1 and C 2 : final processed ciphertext collections at H 1 and H 2 after receiving data from the database server; C 1 , j and C 2 , j are specific elements within these collections.
  • i t e m j : represents the result of multiplying C 1 , j and C 2 , j used to query the filter.
  • j: represents the index used by the client to obtain the intersection.

7.2. Protocol Process

7.2.1. Preprocessing

  • Discuss security parameters: Each party discusses the necessary security parameters—the large prime q used in DH encryption and the client’s public key p k c required for the Paillier encryption system. The client and the database server negotiate the creation of hash function H.
  • Client sends E p k c ( a ) : the client generates its private secret number a and sends E p k c ( a ) to the database server.
  • Database server generates private key: the database server creates its private key α , used for the DH encryption algorithm.
  • Data scrambling: the client and the database server each shuffle their respective datasets.
  • Client calculates hashes and generates random numbers: the client computes h j = H ( y j ) and generates n 2 random numbers β j , ω j , r 1 j , r 2 j , and computes r 1 j h j , r 2 j h j where r 1 j + r 2 j = a .

7.2.2. Outsourcing

  • Client sends data to cloud servers: the client sends r 1 j h j , ω j to cloud server H 1 , and r 2 j h j , β j to cloud server H 2 . H 1 computes C 1 , j = E p k c ( r 1 j h j ω j ) , and H 2 computes C 2 , j = E p k c ( r 2 j h j β j ) . At this point, H 1 and H 2 hold the client’s obfuscated data.
  • Database server sends data to cloud servers: Using E p k c ( a ) , the database server performs the filter insertion operation CF . insert E p k c ( a ) α H ( x i ) to generate a Cuckoo filter and sends it to cloud server H 2 . H 2 stores the filter sent by the database server.

7.2.3. Intersection

  • H 1 and H 2 send data: H 1 and H 2 each send their respective collections C 1 and C 2 to the database server.
  • Database server processes data: Upon receiving the data, the database server uses its private key α to compute C 1 , j = C 1 , j α = E p k c ( r 1 j h j ω j ) α and sends the results back to H 1 . It also processes C 2 , j = C 2 , j α = E p k c ( r 2 j h j β j ) α and sends the results back to H 2 .
  • H 1 processes data: after receiving data from the database server, H 1 uses the random number ω j to calculate C 1 , j = C 1 , j 1 / ω j = E p k c ( r 1 j h j ω j ) α 1 / ω j and sends the results to H 2 .
  • H 2 processes data: Upon receiving data from H 1 and the database server, H 2 calculates C 2 , j = C 2 , j 1 / β j = E p k c ( r 2 j h j β j ) α 1 / β j . H 2 checks if i t e m j = C 1 , j C 2 , j exists in C F . If it does, it returns the index j of i t e m j and sends it to the client.
  • Obtaining the intersection: the client receives the index j and retrieves the intersecting element y j .

7.3. Correctness Analysis

If x i = y j , then H ( x i ) = H ( y j ) , which implies that C 1 , j C 2 , j = C 1 , j 1 / ω j C 2 , j 1 / β j = E p k c ( r 1 j h j ω j ) α 1 / ω j E p k c ( r 2 j h j β j ) α 1 / β j = E p k c ( r 1 j h j α ) E p k c ( r 2 j h j α ) = E p k c [ α h j ( r 1 j + r 2 j ) ] = E p k c ( α h j a ) = E p k c ( a ) { α H ( x i ) } .
Thus, the client can accurately obtain the intersection elements from both parties.

7.4. Security Analysis

Firstly, we consider the security of a small health app developer’s data in the set. In considering security against collusion attacks, it is generally assumed that there is an adversary who possesses the perspective and information of all participating parties except for the protected entity. This means the adversary can access, control, or receive information and resources from all participants except for the protected party. In this scenario, the adversary attempts to compromise the system’s security or privacy by aggregating these insights, such as revealing sensitive data of the protected party. If, in this context, the adversary still cannot learn or infer the protected party’s data, then it is proven that the data and privacy of the protected party are sufficiently secured against collusion attacks.
This section defines a game where the security objective is to maintain confidentiality of the data within the set under semi-honest and collusion conditions. The game for securing the client’s dataset is as follows:
  • The client runs the preprocessing algorithm, sharing the cryptographic hash function H and the large prime q used in the protocol with the adversary.
  • The client simulates the outsourcing algorithm and sends their (encrypted) input to the adversary.
  • The client and the adversary simulate the intersection algorithm and discard any output.
  • The adversary is asked to output a guess y ^ of the client’s input y.
The game is analogized to a deterministic one-way function, such as a public key encryption scheme. Let S be the simulated messages of the client during the game. Let a one-way function adversary A be given the information (public key) p k and function (ciphertext) c (encrypted y). The advantage of the adversary A d v A is defined as the difference between the successful guesses of A and A . If this advantage is negligible in the security parameter λ , then the outsourced PSI is considered secure. That is, let A d v A = Pr [ A ( S ) = y ] Pr [ A ( p k , c ) = y ] . If A d v A < 1 poly ( λ ) , then the protocol is said to be secure.
Specifically, after the steps mentioned above, H 1 , H 2 , and the database server have a complete view of the process. However, under the two-server architecture, as illustrated in Figure 5:
  • In step four of Figure 5, since r 1 j and r 2 j are unknown to the adversary, h j cannot be derived. The adversary can only attempt exhaustive guessing, thus making Adv A negligible.
  • In subsequent steps, as A does not know the client’s private key for the Paillier encryption system, it is impractical to decrypt the ciphertexts, making it even more challenging to derive h j . For instance, i t e m j = C 1 , j C 2 , j = C 1 , j   1 / ω j C 2 , j   1 / β j = E p k c ( r 1 j h j ω j ) α 1 / ω j E p k c ( r 2 j h j β j ) α 1 / β j , and since the private key used in Paillier’s system by the client is unknown, decrypting this compound is complex and hence h j remains secure.
From the analysis above, it is evident that the advantage of Adv A is negligible. Therefore, if both cloud servers collude with the database server, they cannot deduce the client’s original data.
Next, consider the security of the data in the database server’s set. Obviously, apart from the database server itself, none of the parties know the database server’s private key α , hence even if both cloud servers colluded with the client, they cannot derive the original data from C F .
It is particularly noted that due to the prevalence of attacks on hash functions, further security enhancements are recommended by protecting the hashed data as the raw data.
In conclusion, the dual-server scheme successfully resists collusion attacks under semi-honest conditions. By thoroughly integrating considerations for security and privacy into the protocol design, both the client’s and the database server’s data are assured of robust protection. This solution not only provides an effective mechanism for PSI but also demonstrates resilience against potential collusion threats.

7.5. Experimental Analysis

7.5.1. Data Computation Volume

When evaluating any protocol’s performance, the computational load borne by the client is undoubtedly a critical factor. As all three protocols have been introduced, this section focuses particularly on the client’s computational volume, to accurately gauge and compare the efficiency of the three distinct protocols in operation. Specifically, this section will conduct a detailed analysis and comparison of the primary computational tasks that the client must execute across these protocols, to fully assess each protocol’s demand on the client’s computational resources. This analysis will primarily focus on the types of operations involved, aiming to clarify which protocol demonstrates relative advantages in reducing the client’s computational burden, thus providing a solid basis for selecting the most appropriate protocol. Below is an analysis of the main types of operations involved in each protocol, focusing primarily on the outsourcing and intersection processes, as the preprocessing can be completed offline.
  • Unbalanced PSI protocol based on Cuckoo filter: two rounds of modular exponentiation operations and filter retrieval.
  • Unbalanced PSI protocol based on single-cloud assistance: a single round of multiplication operations and outputting y j based on index j.
  • Unbalanced PSI protocol based on dual-cloud assistance: two rounds of multiplication operations and outputting y j based on index j.
An analysis of the single-instance time consumption for these four operations offers a practical insight into the computational volume differences:
  • Modular exponentiation operation: Representing computation-intensive operations, modular exponentiation becomes particularly time-consuming. On a standard hardware setup, the time required for a single modular exponentiation operation depends primarily on the size of the numbers involved and the efficiency of the algorithm.
  • Multiplication operation: Compared to modular exponentiation, multiplication operations execute much faster on modern computing systems, even when involving large numbers. Therefore, whether it’s a single round of multiplication in the single-cloud protocol or two rounds in the dual-cloud protocol, the processing times are relatively short.
  • Cuckoo filter retrieval: Although relatively quick, the retrieval operation for a Cuckoo filter involves memory access, which may make it slightly slower than simple arithmetic operations. The exact time required for this operation depends on the size of the filter and the efficiency of the implementation.
  • Outputting y j based on index j: This operation involves retrieving an element from an array or list based on a specific index and is generally very fast, primarily limited by memory access speeds.
After a detailed analysis and comparison, this section has conducted a thorough exploration of the key computational tasks executed by the client across the three different protocols. These tasks include modular exponentiation, multiplication operations, Cuckoo filter retrieval, and data retrieval based on an index. By assessing these types of computations and their specific time consumptions, the following conclusions can be drawn:
  • Unbalanced PSI protocol based on Cuckoo filter: primarily relies on two rounds of modular exponentiation, which are computation-intensive, especially when dealing with large numbers.
  • Unbalanced PSI protocol based on single-cloud assistance: by executing a single round of multiplication and an index-based data retrieval process, it significantly alleviates the computational burden on the client.
  • Unbalanced PSI protocol based on dual-cloud assistance: Includes two rounds of multiplication operations and an index-based data retrieval process, also aiming to distribute the computational pressure on the client. Although it involves two rounds of multiplication, due to the inherent efficiency of the operation, the total processing time remains within an acceptable range.
Through the meticulous assessment of each protocol’s computational types and their time consumptions, it is evident that both the unbalanced PSI protocol based on single-cloud assistance and unbalanced PSI protocol based on dual-cloud assistance exhibit excellent performance in reducing the client’s computational burden, particularly in the efficient execution of multiplication operations and data retrieval. In contrast, the unbalanced PSI protocol based on Cuckoo filter, while potentially offering stronger security provisions, shows some deficiencies in efficiency and timeliness. Therefore, when choosing an appropriate protocol, a balance should be struck based on actual performance requirements and security needs.

7.5.2. Protocol Running Time

After introducing all three protocols, this section primarily discusses the running times of the protocols. The running time of a protocol is an important benchmark for evaluation in this paper because it directly reflects the protocol’s efficiency in practical operations. The factors affecting the running time of the protocol include computational time and communication time. As shown in Table 5, experiments were conducted to record the running times of the protocols under various data volume combinations. Table 5 also places the running times of the unbalanced PSI protocol based on Cuckoo filter, unbalanced PSI protocol based on single-cloud assistance, and unbalanced PSI protocol based on dual-cloud assistance side by side for comparative analysis. Here, Protocol 1 refers to the unbalanced PSI protocol based on Cuckoo filter, Protocol 2 refers to the unbalanced PSI protocol based on single-cloud assistance, and Protocol 3 refers to the unbalanced PSI protocol based on dual-cloud assistance.
It is noteworthy that the preprocessing stages of all three protocols can be completed offline, meaning they do not directly contribute to online operation delays. Therefore, the recorded running times in this paper refer to the total time of all processes excluding preprocessing. Specifically, in Protocol 1, this primarily refers to the total duration of the intersection process; in Protocols 2 and 3, it refers to the total duration of both the outsourcing and intersection processes.
Through experimental analysis, the paper draws the following conclusions: At smaller data volumes, the performance differences between the three protocols are not significant. However, as the data volume increases, the differences in running times between the protocols become apparent. Generally, the unbalanced PSI protocol based on Cuckoo filter tends to have the longest running time, while the unbalanced PSI protocol based on single-cloud assistance has the shortest running time, and the performance of the unbalanced PSI protocol based on dual-cloud assistance is in the middle. This phenomenon can be explained by the complexity of data handling and the differences in communication overhead among the protocols. The unbalanced PSI protocol based on Cuckoo filter, due to its direct and unoptimized calculations, is less efficient when handling large volumes of data. Nevertheless, at very small data volumes, where the proportion of communication time is relatively high, the impact of data transmission costs on total running time becomes significant. In such cases, the unbalanced PSI protocol based on Cuckoo filter does not necessarily appear inefficient because other protocols might be even less efficient in data transmission. Especially in environments with poor network conditions or limited data transfer rates, the lower communication demands of the unbalanced PSI protocol based on Cuckoo filter might, in some cases, lead to better performance.
Moreover, the running times of the unbalanced PSI protocol based on single-cloud assistance and the unbalanced PSI protocol based on dual-cloud assistance are significantly reduced through distributed computing and the use of cloud resources, especially when dealing with large-scale datasets. In summary, choosing the appropriate protocol requires a comprehensive consideration of factors such as data volume, computational resources, and network environment. In practical applications, understanding the performance characteristics and suitable scenarios of each protocol is crucial for optimizing data processing workflows and enhancing efficiency.

7.6. Summary of This Chapter

The protocol leverages the computational and storage resources of two cloud servers, significantly reducing the burden on the client by lowering its computational and storage requirements and enhancing the system’s efficiency and availability. Through distributed computing and security measures such as homomorphic encryption, it ensures the safety and privacy of data during transmission and processing, adequately protecting sensitive information of both the client and the database server. This solution not only improves the operational efficiency of devices with limited resources but also effectively prevents collusion attacks. Consequently, the unbalanced PSI protocol based on dual-cloud assistance excels in PSI operations, particularly in applications like private contact discovery, demonstrating both high efficiency and security.

7.7. Extensions

To enhance the practicality of the scheme, this section will explore two key aspects from an engineering practice perspective: the design of the PSI network and the design of the data update mechanism.
First, the design of the PSI network focuses on building an efficient, secure, and scalable network architecture to support large-scale PSI computations.
Second, the design of the data update mechanism involves a method to update the datasets stored on the cloud servers without interrupting the service. This is particularly crucial for PSI computation scenarios that require frequent data updates.

7.7.1. PSI Network

As previously described, the client delegates PSI computations to two cloud servers. In practice, a vast network of cloud servers can be built to support this delegation. The basic system description is as follows.
  • Access and authentication of cloud servers: Any server can apply to become a cloud server, also known as a server assistant. These servers must undergo a series of certification processes (including hardware performance verification, security vulnerability scanning, and compliance checks) to ensure they meet security and performance standards. Servers that pass the certification but later violate regulations will be blacklisted and removed. The system maintains platform security and trust through mechanisms such as regular security scans and real-time monitoring, with any violations leading to the immediate removal and further investigation of the server.
  • Mechanism for selecting Server assistants: When needing to perform PSI, clients choose two cloud servers based on their performance (such as processing power, storage capacity, and network bandwidth), stability, security capabilities, and compliance with regulations, among other hard and soft factors. Cloud servers with high availability promises are preferred to minimize the risk of failures.
  • Execution mechanism for PSI operations: The PSI network supports client flexibility and system scalability; clients can execute PSI on different database servers by merely changing E p k ( a ) , without needing to redesign the entire system. This design enhances client flexibility and the system’s efficiency, reliability, and security.

7.7.2. Summary of the PSI Network

This system design not only achieves the delegation of PSI computations but also introduces multiple cloud servers into the network, thereby enhancing the system’s flexibility and stability. Additionally, by implementing authentication and maintaining a blacklist for cloud servers, the system can better guarantee the credibility of the cloud servers, enhancing overall security. This flexible yet secure system design provides clients with more options and makes PSI operations more adaptable to various practical requirements.
In summary, under the existing framework, clients can delegate computing and storage tasks to different cloud servers and perform PSI operations on various database servers by using different random numbers and different E p k ( a ) . This method allows clients to more flexibly use multiple resource nodes and optimize task distribution, thereby further enhancing the overall performance and security of the privacy protection scheme.

7.7.3. Data Updates

To further enhance the practicality of the scheme, this paper also designs a data update mode compatible with the scheme, making the overall scheme more practical and reliable.
  • Data Updates on the Database Server Side:
    As shown in Figure 6, the update details of the database server are as follows:
    Definition of main participants and related symbols:
    • database server: represents the database server that wants to encrypt and upload updated data to cloud server H 2 .
    • cloud server H 2 ): represents the cloud-assisted server H 2 that assists the database server in completing update operations.
    • Z represents the set of data to be updated, z k represents the k-th element of Z.
    • ω represents the load factor of the filter.
    • z k represents the data z k after encryption processing.
    • update k represents the operation index, used to determine whether the update operation is an insertion or deletion.
    • U represents the set of data sent by the database server to the cloud-assisted server H 2 , u k represents the k-th element of U.
    Update process:
    • The database server has a set of elements Z it wants to insert or delete. These elements are blinded before being sent to cloud server H 2 . Specifically, z k = E p k c ( a ) α H ( z k ) .
    • In addition to sending the blinded elements, the database server also sends an identifier variable update k to inform the client whether the operation is an insertion or a deletion.
    • During an insertion operation, H 2 first checks whether the current filter’s load factor ω exceeds 0.95.
    • If the load factor ω is greater than 0.95, then H 2 must request the database server to generate a new filter using all elements to maintain high spatial and lookup efficiency of the filter.
    • If the load factor ω is less than or equal to 0.95, then H 2 can directly insert the element into the current filter C F .
    • In a deletion operation, H 2 removes the specified element from the filter C F , a process that does not require generating a new filter.
    This section introduces the data update process for the database server under the unbalanced PSI protocol based on single-cloud assistance. This series of update operations allows the database server to flexibly handle the insertion and deletion of elements based on the current state of the filter, ensuring the system’s efficiency and accuracy.
  • Data updates on the client side: As shown in Figure 7, the update details of the database server are as follows:
    Definition of main participants and related symbols:
    • client: represents the client who wants to perform data updates.
    • cloud server H 1 : represents the cloud-assisted server H 1 that assists the database server in completing update operations.
    • cloud server H 2 represents the cloud-assisted server H 2 that assists the database server in completing update operations.
    • Z represents the set of data to be updated, z k represents the k-th element of Z.
    • z k represents the data after being processed by the hash function H.
    • k represents the data index, used to determine the type of update, either insertion or deletion, and to retrieve the updated data based on the index.
    • When adding data, date k represents the data processed through the dual-cloud scheme and sent to the two cloud-assisted servers. When deleting, date k is null.
    • V represents the set of data sent by the database server to the cloud-assisted server H 1 , v k represents the k-th element of V.
    • V represents the set of data sent by the database server to the cloud-assisted server H 2 , v k represents the k-th element of V .
    Update process:
    • The client has a set of elements Z it wants to insert or delete. In both cases, the client blinds each element and sends them to H 1 and H 2 respectively.
    • The client sends a data index K to inform the cloud servers about the type of update, whether it is an insertion or a deletion. If the index is less than n 2 , it indicates a deletion operation. In this case, data k is null, and H 1 and H 2 delete the corresponding data based on the index.
    • If the index is greater than n 2 , it indicates an addition operation, and the corresponding calculation results and index are saved.
    • After completing a batch of deletion and addition operations, the relative order of the indices also needs to be adjusted. The update process is illustrated in Figure 5.
    This section introduces a client data update process based on dual-cloud assistance, designed to enhance the database’s dynamic management capabilities while ensuring data privacy and efficiency. This update protocol supports both data insertion and deletion operations, and through the cooperation of cloud-assisted servers H 1 and H 2 , it optimizes the speed and security of client data updates.
  • Summary of data updates: This section has explored two key data update processes based on the unbalanced PSI protocol based on dual-cloud assistance the database server update process and the client update process. Both processes are designed to efficiently handle data insertions and deletions while ensuring data security, and to use cloud server resources to optimize overall operation efficiency.

8. Conclusions and Future Work

8.1. Work Summary

Privacy computing is a technology framework aimed at protecting individual privacy during the process of data use and sharing. It ensures that data can still be effectively utilized without disclosing specific content through various algorithms and protocols. Among many applications of privacy computing, Privacy Set Intersection (PSI) is a common requirement, which allows two or more parties to compute the intersection of their datasets without revealing their exclusive data to each other.
Traditional PSI protocols are primarily designed for cases where datasets are relatively balanced in size, which often does not apply in real scenarios. In many practical situations, the size disparity between participants’ datasets is significant, necessitating the use of unbalanced PSI protocols. These protocols are specifically designed to handle such disparities, optimizing computational efficiency and privacy protection to cater to a wider range of practical needs. By adopting unbalanced PSI protocols, not only is the processing efficiency improved, but more precise control over data protection is also offered, thus finding broader application in various data-sensitive industries. This paper proposes three protocols: the unbalanced PSI protocol based on Cuckoo filter, the unbalanced PSI protocol based on single-cloud assistance, and the unbalanced PSI protocol based on dual-cloud assistance. Here, the unbalanced PSI protocol based on Cuckoo filter addresses performance issues of traditional PSI protocols in handling unbalanced datasets. On this basis, the unbalanced PSI protocol based on single-cloud assistance transfers most of the computational and storage burdens from the client to the cloud, enhancing practicality. Faced with the possibility of collusion attacks, the unbalanced PSI protocol based on dual-cloud assistance employs security mechanisms such as homomorphic encryption to effectively resist these attacks. The main contributions of this paper are summarized as follows:
  • Addressing the shortcomings of traditional PSI protocols when dealing with significant data size disparities among participants, this paper proposes the first protocol, namely the unbalanced PSI protocol based on Cuckoo filter. This protocol successfully constructs a novel PSI approach through encrypted exchanges and using Cuckoo filter for private information retrieval.
  • Given the complexities of cryptographic operations and storage demands in the unbalanced PSI protocol based on Cuckoo filter, this paper introduces a unbalanced PSI protocol based on single-cloud assistance. This protocol successfully offloads most of the client’s computational and storage burdens onto the cloud.
  • In response to potential collusion between the cloud and database servers in the unbalanced PSI protocol based on single-cloud assistance, this paper proposes an unbalanced PSI protocol based on dual-cloud assistance with security mechanisms like homomorphic encryption, which effectively prevents collusion attacks while offloading computational and storage burdens.
  • Concerning practical issues in the unbalanced PSI protocol based on dual-cloud assistance, this paper also introduces a conceptually meaningful PSI network and a data update mode tailored for the unbalanced PSI protocol based on dual-cloud assistance.

8.2. Protocol Summary

As shown in Table 6, this section provides a comprehensive summary and recommendations for the three protocols discussed in this paper. The unbalanced PSI protocol based on Cuckoo filter offers high security but involves significant computational and storage demands, making it suitable for clients with strong computational and storage resources. The unbalanced PSI protocol based on single-cloud assistance, while being the fastest and offloading computational burdens to the cloud, poses security risks as it cannot withstand collusion attacks, making it appropriate for scenarios where the cloud is fully trusted. The unbalanced PSI protocol based on dual-cloud assistance offers an ideal balance of runtime, security, and efficiency, making it the most versatile and practical option.

8.3. Future Outlook

Although the protocols proposed in this document are applicable in most scenarios, there are still several aspects that could be optimized for future development:
  • All protocols are designed for two-party unbalanced PSI. Extending these protocols to multi-party scenarios is an important future direction, given the practical needs for multi-party computations.
  • The protocols are developed under a semi-honest security model. Extending their robustness to malicious models, where adversaries may actively attempt to undermine the protocols, represents a crucial area for further research.
  • The current protocols focus solely on set intersection. In practical applications, there may be requirements to perform further computations on the intersection results. Developing functionalities to support such computations post-intersection is another significant direction for future work.

Author Contributions

Conceptualization, S.D.; Methodology, J.W.; Software, Q.F.; Validation, J.W.; Formal analysis, Q.F.; Investigation, Q.F.; Resources, W.T. and J.W.; Data curation, S.D.; Writing—original draft, Q.F. and S.D.; Writing—review & editing, Q.F.; Visualization, S.D.; Supervision, W.T. and S.D.; Project administration, Q.F. and W.T.; Funding acquisition, W.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Guangdong Key Laboratory of Data Security and Privacy Preserving: 2023B1212060036.

Data Availability Statement

The original data for this article were generated and recorded by ourselves. The data for this article does not originate from a publicly available repository.The authors confirm that the data supporting the findings of this study are available within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bald, P.; Baronio, R.; Cristofaro, E.; Gasti, P.; Tsudik, G. Efficient and secure testing of fully-sequenced human genomes. Biol. Sci. Initiat. 2000, 470, 7–10. [Google Scholar]
  2. Chen, H.; Laine, K.; Rindal, P. Fast private set intersection from homomorphic encryption. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1243–1255. [Google Scholar]
  3. Nagaraja, S.; Mittal, P.; Hong, C.Y.; Caesar, M.; Borisov, N. BotGrep: Finding P2P Bots with Structured Graph Analysis. In Proceedings of the 19th USENIX Security Symposium (USENIX Security 10), Washington, DC, USA, 11–13 August 2010. [Google Scholar]
  4. Chen, H.; Huang, Z.; Laine, K.; Rindal, P. Labeled PSI from fully homomorphic encryption with malicious security. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1223–1237. [Google Scholar]
  5. Kamara, S.; Mohassel, P.; Raykova, M.; Sadeghian, S. Scaling private set intersection to billion-element sets. In Proceedings of the Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, 3–7 March 2014; Revised Selected Papers. Springer: Berlin/Heidelberg, Germany, 2014; pp. 195–215. [Google Scholar]
  6. Pinkas, B.; Schneider, T.; Weinert, C.; Wieder, U. Efficient circuit-based PSI via cuckoo hashing. In Proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, 19–23 May 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 125–157. [Google Scholar]
  7. Li, W.; Liu, J.; Zhang, L.; Wang, Q.; He, C. A Survey on Set Intersection Computation for Privacy Protection. J. Comput. Res. Dev. 2022, 59, 1782–1799. [Google Scholar]
  8. Meadows, C. A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. In Proceedings of the 7th IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 7–9 April 1986; p. 134. [Google Scholar]
  9. Huberman, B.; Franklin, M.; Hogg, T. Enhancing Privacy and Trust in Electronic Communities. In Proceedings of the 1st ACM Conference on Electronic Commerce, Denver, CO, USA, 3–5 November 1999; pp. 78–86. [Google Scholar]
  10. DeCristofaro, E.; Tsudik, G. Experimenting with Fast Private Set Intersection. In International Conference on Trust and Trustworthy Computing; Springer: Berlin/Heidelberg, Germany, 2012; pp. 55–73. [Google Scholar]
  11. Pinkas, B.; Schneider, T.; Zohner, M. Faster Private Set Intersection Based on OT Extension. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; pp. 797–812. [Google Scholar]
  12. Freedman, M.; Nissim, K.; Pinkas, B. Efficient Private Matching and Set Intersection. In Proceedings of the 23rd International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
  13. Freedman, M.J.; Hazay, C.; Nissim, K.; Pinkas, B. Efficient Set Intersection with Simulation-Based Security. J. Cryptol. 2016, 29, 115–155. [Google Scholar] [CrossRef]
  14. Abadi, A.; Terzis, S.; Dong, C. O-PSI: Delegated Private Set Intersection on Outsourced Datasets. In Proceedings of the 30th IFIP International Information Security and Privacy Conference, Hamburg, Germany, 26–28 May 2015; pp. 3–17. [Google Scholar]
  15. Kissner, L.; Song, D. Privacy-Preserving Set Operations. In Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2005; pp. 241–257. [Google Scholar]
  16. Jarecki, S.; Liu, X. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In Proceedings of the LNCS 5444: 6th Theory of Cryptography Conference, San Francisco, CA, USA, 15–17 March 2009; pp. 577–594. [Google Scholar]
  17. Hazay, C.; Venkitasubramaniam, M. Scalable Multi-party Private Set-Intersection. In Proceedings of the 20th IACR International Workshop on Public Key Cryptography, Amsterdam, The Netherlands, 28–31 March 2017; pp. 175–203. [Google Scholar]
  18. Dou, J.; Liu, X.; Wang, W. Efficient and Secure Calculation of Two-Party Sets in the Field of Rational Numbers. Chin. J. Comput. 2020, 43, 1397–1413. [Google Scholar]
  19. Damgård, I.; Pastro, V.; Smart, N.; Zakarias, S. Multiparty Computation from Somewhat Homomorphic Encryption. In Proceedings of the 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2012; Lecture Notes in Computer Science. Safavi-Naini, R., Canetti, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 643–662. [Google Scholar]
  20. Yao, A.C. Protocols for Secure Computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar]
  21. Micali, S.; Goldreich, O.; Wigderson, A. How to Play Any Mental Game. In Proceedings of the 19th ACM Symposium on Theory of Computing, New York, NY, USA, 25–27 May 1987; pp. 218–229. [Google Scholar]
  22. Pinkas, B.; Schneider, T.; Segev, G.; Zohner, M. Phasing: Privateset intersectionusing permutation-basedhashing. In Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA, 12–14 August 2015; USENIX Association: Berkeley, CA, USA, 2015; pp. 515–530. [Google Scholar]
  23. Pinkas, B.; Schneider, T.; Tkachenko, O.; Yanai, A. Efficient circuit-based PSI with linear communication. In Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 122–153. [Google Scholar]
  24. Huang, Y.; Evans, D.; Katz, J. Private Set Intersection: Are Garbled Circuits Better Than Custom Protocols? In Proceedings of the 19th Network and Distributed System Security Symposium, San Diego, CA, USA, 5–8 February 2012. [Google Scholar]
  25. Naor, M.; Pinkas, B. Efficient oblivious transfer protocols. In Proceedings of the SODA, Washington, DC, USA, 7–9 January 2001; Volume 1, pp. 448–457. [Google Scholar]
  26. Dong, C.; Chen, L.; Wen, Z. When private set intersection meets big data: An efficient and scalable protocol. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013; pp. 789–800. [Google Scholar]
  27. Rindal, P.; Rosulek, M. Improved private set intersection against malicious adversaries. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, 30 April–4 May 2017; Springer International Publishing: Cham, Switzerland, 2017; pp. 235–259. [Google Scholar]
  28. Zhang, E.; Liu, F.H.; Lai, Q.; Jin, G.; Li, Y. Efficient multi-party private set intersection against malicious adversaries. In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, London, UK, 11 November 2019; pp. 93–104. [Google Scholar]
  29. Pinkas, B.; Rosulek, M.; Trieu, N.; Yanai, A. PSI from PaXoS: Fast, malicious private set intersection. In Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Cham, Switzerland, 2020; pp. 739–767. [Google Scholar]
  30. Orrù, M.; Orsini, E.; Scholl, P. Actively secure 1-out-of-n OT extension with application to private set intersection. In Proceedings of the Cryptographers’ Track at the RSA Conference, San Francisco, CA, USA, 14–17 February 2017; Springer: Cham, Switzerland, 2017; pp. 381–396. [Google Scholar]
  31. Rindal, P.; Schoppmann, P. VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE. IACR Cryptology ePrint Archive. 2021. Available online: https://eprint.iacr.org/2021/266 (accessed on 22 April 2024).
  32. Schoppmann, P.; Gascón, A.; Reichert, L.; Raykova, M. Distributed vector-OLE: Improved constructions and implementation. In Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 1055–1072. [Google Scholar]
  33. Weng, C.; Yang, K.; Katz, J.; Wang, X. Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. Cryptology ePrint Archive. 2020. Available online: https://eprint.iacr.org/2020/925 (accessed on 22 April 2024).
  34. Wang, Z.; Ma, X. Blockchain-Based Unbalanced PSI with Public Verification and Financial Security. Mathematics 2024, 12, 1544. [Google Scholar] [CrossRef]
  35. Ning, J.; Tan, Z.; Zhang, K.; Ye, W. Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets. IET Inf. Secur. 2024, 2024, 6052651. [Google Scholar] [CrossRef]
  36. Zhao, Q.; Jiang, B.; Zhang, Y.; Wang, H.; Mao, Y.; Zhong, S. Unbalanced private set intersection with linear communication complexity. Sci. China Inf. Sci. 2024, 67, 1–15. [Google Scholar] [CrossRef]
  37. Tan, W.; Du, S.; Weng, J. Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Preprints 2024, 2024041701. [Google Scholar] [CrossRef]
  38. Yang, X.; Cai, L.; Wang, Y.; Sun, L.; Hu, J. Efficient Unbalanced Quorum PSI from Homomorphic Encryption. Cryptol. Eprint Arch. 2024; preprint. [Google Scholar]
  39. Chen, Y.; Wu, A.; Yang, Y.; Xin, X.; Song, C. Efficient Verifiable Cloud-Assisted PSI Cardinality for Privacy-Preserving Contact Tracing. IEEE Trans. Cloud Comput. 2024, 12, 251–263. [Google Scholar] [CrossRef]
  40. Van Baarsen, A.; Stevens, M. Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting. Cryptol. Eprint Arch. 2024; preprint. [Google Scholar]
  41. Bienstock, A.; Patel, S.; Seo, J.Y.; Yeo, K. Batch PIR and Labeled PSI with Oblivious Ciphertext Compression. Cryptol. Eprint Arch. 2024; preprint. [Google Scholar]
  42. Hao, M.; Liu, W.; Peng, L.; Li, H.; Zhang, C.; Chen, H.; Zhang, T. Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval. Cryptol. Eprint Arch. 2023; preprint. [Google Scholar]
  43. Son, Y.; Jeong, J. PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption. In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, Melbourne, Australia, 10–14 July 2023; pp. 342–356. [Google Scholar]
  44. Yang, Y.; Dong, X.; Shen, J.; Cao, Z.; Yang, Y.; Zhou, J.; Fang, L.; Liu, Z.; Ge, C.; Su, C.; et al. MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. In Proceedings of the 2023 20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, Denmark, 21–23 August 2023; pp. 1–7. [Google Scholar]
  45. Papafragkos, P.; Gavalas, I.; Raptopoulos, I.; Chasalevris, A. Optimizing energy dissipation in gas foil bearings to eliminate bifurcations of limit cycles in unbalanced rotor systems. Nonlinear Dyn. 2023, 111, 67–95. [Google Scholar] [CrossRef]
  46. Arivumani, V.; Balaraman, S. Angular symmetrical components-based anti-islanding method for solar photovoltaic-integrated microgrid. Automatika 2023, 64, 1–21. [Google Scholar] [CrossRef]
  47. Berenjian, S. Encryption-Based Secure Protocol Design for Networks. Ph.D. Thesis, Stevens Institute of Technology, Hoboken, NJ, USA, 2023. [Google Scholar]
  48. Hill, K. Facebook Figured Out My Family Secrets, And It Won’t Tell Me How. Gizmodo 2017. Published on 25 August 2017. Available online: https://gizmodo.com/facebook-figured-out-my-family-secrets-and-it-wont-tel-1797696163 (accessed on 22 April 2024).
  49. Marlinspike, M. Private Contact Discovery for Signal. 2017. Available online: https://signal.org/blog/private-contact-discovery (accessed on 26 September 2017).
  50. Mittal, P.; Papamanthou, C.; Song, D. Preserving Link Privacy in Social Network Based Systems. In Proceedings of the NDSS, San Diego, CA, USA, 24–27 February 2013. [Google Scholar]
  51. Abebe, R.; Nakos, V. Private Link Prediction in Social Networks; Technical Report; Harvard University: Cambridge, MA, USA, 2014. [Google Scholar]
  52. Karwa, V.; Raskhodnikova, S.; Smith, A.; Yaroslavtsev, G. Private Analysis of Graph Structure. Proc. VLDB Endow. 2011, 4, 1146–1157. [Google Scholar] [CrossRef]
  53. Dwork, C. A Firm Foundation for Private Data Analysis. Commun. ACM 2011, 54, 86–95. [Google Scholar] [CrossRef]
  54. Erlingsson, Ú.; Pihur, V.; Korolova, A. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, 3–7 November 2014. [Google Scholar]
  55. Brendel, W.; Han, F.; Marujo, L.; Jie, L.; Korolova, A. Practical privacy-preserving friend recommendations on social networks. In Proceedings of the Companion Proceedings of the The Web Conference 2018, Gothenburg, Sweden, 27 May–3 June 2018; pp. 111–112. [Google Scholar]
  56. Su, G.; Xu, M. A Survey on Secure Multi-party Computation Technology and Applications. Inf. Commun. Technol. Policy 2019, 5, 19–22. [Google Scholar]
  57. Wang, H.; Dai, H.; Chen, S.; Chen, Z.; Chen, G. A Survey of Filter Data Structures. Comput. Sci. 2024, 51, 35–40. [Google Scholar]
  58. Yu, M.; Fabrikant, A.; Rexford, J. BUFFALO: Bloom filter forwarding architecture for large organizations. In Proceedings of the International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, 1–4 December 2009; pp. 313–324. [Google Scholar]
  59. Li, P.; Luo, B.; Zhu, W.; Xu, H. Cluster-based distributed dynamic cuckoo filter system for Redis. Int. J. Parallel Emergent Distrib. Syst. 2020, 35, 340–353. [Google Scholar] [CrossRef]
  60. Wang, F.; Chen, H.; Liao, L.; Zhang, F.; Jin, H. The power of better choice: Reducing relocations in cuckoo filter. In Proceedings of the International Conference on Distributed Computing Systems, Dallas, TX, USA, 7–9 July 2019; pp. 358–367. [Google Scholar]
  61. Gu, R.; Li, S.; Dai, H.; Wang, H.; Luo, Y.; Fan, B.; Basat, R.B.; Wang, K.; Song, Z.; Chen, S.; et al. Adaptive online cache capacity optimization via lightweight working set size estimation at scale. In Proceedings of the USENIX Annual Technical Conference, Boston, MA, USA, 10–12 July 2023; pp. 467–484. [Google Scholar]
  62. Reviriego, P.; Martínez, J.; Larrabeiti, D.; Pontarelli, S. Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2690–2701. [Google Scholar] [CrossRef]
Figure 1. Private contact discovery.
Figure 1. Private contact discovery.
Information 15 00554 g001
Figure 2. PSI protocol flow chart based on DH key exchange mechanism.
Figure 2. PSI protocol flow chart based on DH key exchange mechanism.
Information 15 00554 g002
Figure 3. Unbalanced PSI protocol based on Cuckoo filter.
Figure 3. Unbalanced PSI protocol based on Cuckoo filter.
Information 15 00554 g003
Figure 4. Unbalanced PSI protocol based on single-cloud assistance.
Figure 4. Unbalanced PSI protocol based on single-cloud assistance.
Information 15 00554 g004
Figure 5. Unbalanced PSI protocol based on dual-cloud assistance.
Figure 5. Unbalanced PSI protocol based on dual-cloud assistance.
Information 15 00554 g005
Figure 6. Data Updates on the Database Server Side.
Figure 6. Data Updates on the Database Server Side.
Information 15 00554 g006
Figure 7. Data updates on the client’s side.
Figure 7. Data updates on the client’s side.
Information 15 00554 g007
Table 1. Runtime of the PSI protocol Based on DH key exchange mechanism.
Table 1. Runtime of the PSI protocol Based on DH key exchange mechanism.
Cardinality of Dataset
from Participant One
Cardinality of Dataset
from Participant Two
Protocol Runtime
(s)
2 10 2 15 1.7442
2 10 2 17 6.8024
2 10 2 20 55.2655
2 10 2 25 1849.2111
2 15 2 15 4.9248
2 15 2 17 10.0466
2 15 2 20 58.6051
2 15 2 25 1852.7098
2 17 2 17 20.0932
2 17 2 20 68.9472
2 17 2 25 1863.5443
2 20 2 20 165.4733
2 20 2 25 1964.6669
Table 2. Comparison of PSI protocol runtime based on DH key exchange mechanism and Cuckoo filter.
Table 2. Comparison of PSI protocol runtime based on DH key exchange mechanism and Cuckoo filter.
Cardinality of Dataset
from Participant One
Cardinality of Dataset
from Participant Two
Original Protocol
Runtime (s)
New Protocol
Runtime (s)
2 10 2 15 1.74420.1539
2 10 2 17 6.80240.1569
2 10 2 20 55.26550.1616
2 10 2 25 1849.21110.1693
2 15 2 15 4.92474.9239
2 15 2 17 10.04655.0232
2 15 2 20 58.60505.1709
2 15 2 25 1852.70975.4172
2 17 2 17 20.093120.0930
2 17 2 20 68.947120.6841
2 17 2 25 1863.544221.6690
2 20 2 20 165.4732165.4731
2 20 2 25 1964.6668173.3531
Table 3. Size of Cuckoo filter at different data volumes.
Table 3. Size of Cuckoo filter at different data volumes.
Data Set CountSize of Cuckoo Filter (MB)
2 15 0.535
2 17 2.363
2 20 21.678
2 22 93.645
2 23 194.436
2 24 403.201
2 27 3571.206
2 28 7372.835
2 29 15,206.421
Table 4. Running times of Protocol 1 and Protocol 2 under different data volume combinations.
Table 4. Running times of Protocol 1 and Protocol 2 under different data volume combinations.
Client Dataset SizeDatabase Server Dataset SizeProtocol 1 Running Time (s)Protocol 2 Running Time (s)
2 10 2 15 0.15390.1543
2 10 2 17 0.15690.1573
2 10 2 20 0.16160.1611
2 10 2 25 0.16930.1683
2 15 2 15 4.92393.8223
2 15 2 17 5.02323.9145
2 15 2 20 5.17094.0267
2 15 2 25 5.41724.2233
2 17 2 17 20.093015.6768
2 17 2 20 20.684116.1281
2 17 2 25 21.669016.8939
2 20 2 20 165.4731129.0516
2 20 2 25 173.3531135.2534
Table 5. Running times of the three protocols under different data volume combinations.
Table 5. Running times of the three protocols under different data volume combinations.
Data VolumeProtocol 1
Running Time (s)
Protocol 2
Running Time (s)
Protocol 3
Running Time (s)
2 10 | 2 15 0.15390.15430.1551
2 10 | 2 17 0.15690.15730.1586
2 10 | 2 20 0.16160.16110.1635
2 10 | 2 25 0.16930.16830.1701
2 15 | 2 15 4.92393.82234.3707
2 15 | 2 17 5.02323.91454.4709
2 15 | 2 20 5.17094.02674.6001
2 15 | 2 25 5.41724.22334.8206
2 17 | 2 17 20.093015.676817.8801
2 17 | 2 20 20.684116.128118.4004
2 17 | 2 25 21.669016.893919.2802
2 20 | 2 20 165.4731129.0516147.2608
2 20 | 2 25 173.3531135.2534154.3003
Table 6. Overall performance summary of the three protocols.
Table 6. Overall performance summary of the three protocols.
ProtocolSecurityClient Storage and Computational BurdenRuntime
Unbalanced PSI protocol based on Cuckoo filterHigh security (no collusion attacks)Requires storing Cuckoo filter and intensive computationLongest
Unbalanced PSI protocol based on single-cloud assistanceSecurity risks (cannot resist collusion attacks)Shifted to cloud serverFastest
Unbalanced PSI protocol based on dual-cloud assistanceHigh security (can resist collusion attacks)Shifted to cloud serverModerate
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Feng, Q.; Du, S.; Tan, W.; Weng, J. Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Information 2024, 15, 554. https://doi.org/10.3390/info15090554

AMA Style

Feng Q, Du S, Tan W, Weng J. Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Information. 2024; 15(9):554. https://doi.org/10.3390/info15090554

Chicago/Turabian Style

Feng, Qian, Shenglong Du, Wuzheng Tan, and Jian Weng. 2024. "Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication" Information 15, no. 9: 554. https://doi.org/10.3390/info15090554

APA Style

Feng, Q., Du, S., Tan, W., & Weng, J. (2024). Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Information, 15(9), 554. https://doi.org/10.3390/info15090554

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop