Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives †
Abstract
:1. Introduction
1.1. Related Work
1.2. Our Contribution
- We propose to compute secret-shared private membership test functionality . In , serves as a building block, which securely computes the secret-shared private equality test functionality .
- We offer a generic tPSI framework where two kinds of tPSI could be efficiently implemented: over-threshold PSI () and under-threshold PSI (). Furthermore, we propose a more lightweight tPSI with limited leakage. We prove the security of all protocols under the semi-honest model.
- We introduce a generic precomputing OT method used to generate instances in tPSI. Experimental results on and tPSI show that our proposed protocols are highly efficient and computationally friendly.
2. Preliminaries
2.1. Notation
2.2. Oblivious Transfer
2.3. Cuckoo Hashing
2.4. Secret Sharing
2.5. Security Definition
- The correctness holds:
- There exist probabilistic polynomial-time simulator and , such that
3. Overview of Our Construction
3.1. One-out-of-n Correlated OT
- For , ;
- For and , .
3.2. Secret-Shared Private Equality Test
3.3. Secret-Shared Private Membership Test
4. Secrect-Shared Private Equality Test ()
5. Generic Threshold PSI Protocols
5.1. Over-Threshold PSI Protocol:
5.2. Under-Threshold PSI Protocol:
5.3. Lightweight tPSI with Limited Leakage:
6. Complexity Analysis and Comparisons
7. Implementation and Performance Evaluation
7.1. Generic Precomputing Oblivious Transfer
7.2. Experimental Performance
8. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar]
- Zhao, C.; Zhao, S.; Zhao, M.; Chen, Z.; Gao, C.Z.; Li, H.; Tan, Y. Secure multi-party computation: Theory, practice and applications. Inf. Sci. 2019, 476, 357–372. [Google Scholar] [CrossRef]
- Kolesnikov, V.; Kumaresan, R.; Rosulek, M.; Trieu, N. Efficient batched oblivious PRF with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 818–829. [Google Scholar]
- Pinkas, B.; Schneider, T.; Tkachenko, O.; Yanai, A. Efficient circuit-based psi with linear communication. In Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany 19–23 May 2019; Springer: Berlin, Germany, 2019; pp. 122–153. [Google Scholar]
- Pinkas, B.; Rosulek, M.; Trieu, N.; Yanai, A. SpOT-light: Lightweight private set intersection from sparse OT extension. In Proceedings of the Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2019; Proceedings, Part III 39. Springer: Berlin, Germany, 2019; pp. 401–431. [Google Scholar]
- Kolesnikov, V.; Rosulek, M.; Trieu, N.; Wang, X. Scalable private set union from symmetric-key techniques. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Springer: Cham, Switzerland, 2019; pp. 636–666. [Google Scholar]
- Zhang, C.; Chen, Y.; Liu, W.; Zhang, M.; Lin, D. Linear private set union from {Multi-Query} reverse private membership test. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 337–354. [Google Scholar]
- Le, P.H.; Ranellucci, S.; Gordon, S.D. Two-party private set intersection with an untrusted third party. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 2403–2420. [Google Scholar]
- Kolesnikov, V.; Matania, N.; Pinkas, B.; Rosulek, M.; Trieu, N. Practical multi-party private set intersection from symmetric-key techniques. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1257–1272. [Google Scholar]
- Wei, L.; Liu, J.; Zhang, L.; Wang, Q.; Zhang, W.; Qian, X. Efficient multi-party private set intersection protocols for large participants and small sets. Comput. Stand. Interfaces 2024, 87, 103764. [Google Scholar] [CrossRef]
- Chongchitmate, W.; Ishai, Y.; Lu, S.; Ostrovsky, R. Psi from ring-ole. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022; pp. 531–545. [Google Scholar]
- Lv, S.; Wei, Y.; Jia, J.; Li, X.; Li, T.; Liu, Z.; Chen, X.; Guo, L. New Approach for Efficient Malicious Multiparty Private Set Intersection. Inf. Sci. 2024, 678, 120995. [Google Scholar] [CrossRef]
- Ion, M.; Kreuter, B.; Nergiz, E.; Patel, S.; Saxena, S.; Seth, K.; Shanahan, D.; Yung, M. Private intersection-sum protocol with applications to attributing aggregate ad conversions. Cryptology ePrint Archive 2017, 2017, 738. [Google Scholar]
- Duong, T.; Phan, D.H.; Trieu, N. Catalic: Delegated PSI cardinality with applications to contact tracing. In Proceedings of the Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Republic of Korea, 7–11 December 2020; Proceedings, Part III 26; Springer: Cham, Switzerland, 2020; pp. 870–899. [Google Scholar]
- Kong, X.; Chen, L.; Zhu, Y.; Mu, Y. Efficient Public-key Searchable Encryption Scheme from PSI with Scalable Proxy Servers. IEEE Trans. Serv. Comput. 2024, 1–14. [Google Scholar] [CrossRef]
- Yang, Y.; Chen, X.; Pan, Y.; Shen, J.; Cao, Z.; Dong, X.; Li, X.; Sun, J.; Yang, G.; Deng, R. OpenVFL: A Vertical Federated Learning Framework with Stronger Privacy-Preserving. IEEE Trans. Inf. Forensics Secur. 2024, 19, 9670–9681. [Google Scholar] [CrossRef]
- Yang, Y.; Yang, Y.; Chen, X.; Dong, X.; Cao, Z.; Shen, J. DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA with Oblivious PRF. IEEE Trans. Serv. Comput. 2024, 17, 497–508. [Google Scholar] [CrossRef]
- Bradley, T.; Faber, S.; Tsudik, G. Bounded size-hiding private set intersection. In Proceedings of the International Conference on Security and Cryptography for Networks; Springer: Berlin, Germany, 2016; pp. 449–467. [Google Scholar]
- Zhao, Y.; Chow, S.S. Are you the one to share? secret transfer with access structure. Proc. Priv. Enhanc. Technol. 2017, 2017, 149–169. [Google Scholar] [CrossRef]
- Zhao, Y.; Chow, S.S. Can you find the one for me? In Proceedings of the 2018 Workshop on Privacy in the Electronic Society, Toronto, ON, Canada, 15–19 October 2018; pp. 54–65. [Google Scholar]
- Ghosh, S.; Simkin, M. The communication complexity of threshold private set intersection. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2019; pp. 3–29. [Google Scholar]
- Branco, P.; Döttling, N.; Pu, S. Multiparty cardinality testing for threshold private intersection. In Proceedings of the IACR International Conference on Public-Key Cryptography, Vitual Event, 10–13 May 2021; pp. 32–60. [Google Scholar]
- Badrinarayanan, S.; Miao, P.; Rindal, P. Multi-Party Threshold Private Set Intersection with Sublinear Communication. IACR Cryptol. ePrint Arch. 2020, 2020, 600. [Google Scholar]
- Ghosh, S.; Simkin, M. Threshold private set intersection with better communication complexity. In Proceedings of the IACR International Conference on Public-Key Cryptography; Springer: Cham, Switzerland, 2023; pp. 251–272. [Google Scholar]
- Liu, F.H.; Zhang, E.; Qin, L. Efficient Multiparty Probabilistic Threshold Private Set Intersection. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, 26–30 November 2023; pp. 2188–2201. [Google Scholar]
- Ma, L.; Wang, H.; Niu, Z.; Li, Z.; Wu, L.; Wei, X.; Su, Y. Over-threshold multi-party private set operation protocols for lightweight clients. Comput. Stand. Interfaces 2024, 88, 103781. [Google Scholar] [CrossRef]
- Mohanty, T.; Srivastava, V.; Debnath, S.K.; Das, A.K.; Sikdar, B. Quantum secure threshold private set intersection protocol for IoT-Enabled privacy preserving ride-sharing application. IEEE Internet Things J. 2023, 11, 1761–1772. [Google Scholar] [CrossRef]
- Pinkas, B.; Schneider, T.; Zohner, M. Faster private set intersection based on {OT} extension. In Proceedings of the 23rd {USENIX} Security Symposium ({USENIX} Security 14), San Diego, CA, USA, 20–22 August 2014; pp. 797–812. [Google Scholar]
- Chase, M.; Miao, P. Private set intersection in the internet setting from lightweight oblivious PRF. In Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, 17–21 August 2020; Proceedings, Part III 40; Springer: Cham, Switerland, 2020; pp. 34–63. [Google Scholar]
- Song, X.; Gai, M.; Zhao, S.; Jiang, H. Privacy-Preserving Statistics Protocol for Set-Based Computation (in Chinese). J. Comput. Res. Dev. 2020, 57, 2221. [Google Scholar]
- Ciampi, M.; Orlandi, C. Combining private set-intersection with secure two-party computation. In Proceedings of the International Conference on Security and Cryptography for Networks; Springer: Cham, Switerland, 2018; pp. 464–482. [Google Scholar]
- Karakoç, F.; Küpçü, A. Linear Complexity Private Set Intersection for Secure Two-Party Protocols. Cryptology ePrint Archive, Report 2020/864. In International Conference on Cryptology and Network Security; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Miao, P.; Patel, S.; Raykova, M.; Seth, K.; Yung, M. Two-sided malicious security for private intersection-sum with cardinality. In Proceedings of the Annual International Cryptology Conference; Springer: Cham, Switzerland, 2020; pp. 3–33. [Google Scholar]
- Kolesnikov, V.; Kumaresan, R. Improved OT extension for transferring short secrets. In Proceedings of the Annual Cryptology Conference; Springer: Cham, Switzerland, 2013; pp. 54–70. [Google Scholar]
- Orrù, M.; Orsini, E.; Scholl, P. Actively secure 1-out-of-N OT extension with application to private set intersection. In Proceedings of the Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, 14–17 February 2017; Proceedings. Springer: Cham, Switzerland, 2017; pp. 381–396. [Google Scholar]
- Zhao, S.; Ma, M.; Song, X.; Jiang, H.; Yan, Y.; Xu, Q. Lightweight threshold private set intersection via oblivious transfer. In Proceedings of the Wireless Algorithms, Systems, and Applications: 16th International Conference, WASA 2021, Nanjing, China, 25–27 June 2021; Proceedings, Part III 16. Springer: Cham, Switzerland, 2021; pp. 108–116. [Google Scholar]
- Hu, J.; Zhao, Y.; Tan, B.H.M.; Aung, K.M.M.; Wang, H. Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 2024, 19, 6184–6196. [Google Scholar] [CrossRef]
- Asharov, G.; Lindell, Y.; Schneider, T.; Zohner, M. More efficient oblivious transfer and extensions for faster secure computation. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, Berlin, Germnay, 4–8 November 2013; pp. 535–548. [Google Scholar]
- Yang, K.; Weng, C.; Lan, X.; Zhang, J.; Wang, X. Ferret: Fast Extension for coRRElated oT with small communication. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, 9–13 November 2020; pp. 1607–1626. [Google Scholar]
- Pagh, R.; Rodler, F.F. Cuckoo hashing. J. Algorithms 2004, 51, 122–144. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Goldreich, O. Foundations of Cryptography: Volume 2, Basic Applications; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
- Couteau, G. New protocols for secure equality test and comparison. In Proceedings of the International Conference on Applied Cryptography and Network Security; Springer: Cham, Switzerland, 2018; pp. 303–320. [Google Scholar]
- Beaver, D. Precomputing oblivious transfer. In Proceedings of the Annual International Cryptology Conference; Springer: Cham, Switzerland, 1995; pp. 97–109. [Google Scholar]
Protocol | Public-Key Computation | Communication | Leakage | Functionality | Main Tools |
---|---|---|---|---|---|
[19] | HE, OT | ||||
[20] | - | & | HE | ||
[21] | - | FHE | |||
[23] | - | AHE | |||
[36] | - | & | OT, GC | ||
[24] | - | AHE | |||
Ours * | , & | OT |
Length | Comm. (MB) | Running Time (ms) | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | ||
2.816 | 321.92 | 340.736 | 388.48 | 317.184 | 297.088 | 296.96 | 334.72 | 337.664 | 397.312 | 374.272 | |
5.932 | 628.75 | 665.5 | 758.75 | 619.5 | 580.25 | 580 | 653.75 | 659.5 | 776 | 731 | |
12.264 | 1257.2 | 1331 | 1517.5 | 1239 | 1160.7 | 1160 | 1307.1 | 1319 | 1552.3 | 1462 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, S.; Zhao, C.; Huang, Y.; Song, X.; Xu, Q. Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives. Cryptography 2024, 8, 58. https://doi.org/10.3390/cryptography8040058
Zhao S, Zhao C, Huang Y, Song X, Xu Q. Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives. Cryptography. 2024; 8(4):58. https://doi.org/10.3390/cryptography8040058
Chicago/Turabian StyleZhao, Shengnan, Chuan Zhao, Yuchen Huang, Xiangfu Song, and Qiuliang Xu. 2024. "Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives" Cryptography 8, no. 4: 58. https://doi.org/10.3390/cryptography8040058
APA StyleZhao, S., Zhao, C., Huang, Y., Song, X., & Xu, Q. (2024). Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives. Cryptography, 8(4), 58. https://doi.org/10.3390/cryptography8040058