Efficient disjointness tests for private datasets


Autoria(s): Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
Data(s)

2008

Resumo

We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.

Identificador

http://eprints.qut.edu.au/70392/

Publicador

Springer

Relação

DOI:10.1007/978-3-540-70500-0_12

Ye, Qingsong , Wang, Huaxiong , Pieprzyk, Josef, & Zhang, Xian-Mo (2008) Efficient disjointness tests for private datasets. Lecture Notes in Computer Science, 5107, pp. 155-169.

Direitos

Springer-Verlag Berlin Heidelberg

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Private Set Disjointness #Private Matching #Secure Multi-Party Computation
Tipo

Journal Article