Set intersection protocol with privacy preservation
Annotation
The Private Set Intersection Protocol (PSI) is one of the fundamental primitives of secure multi-party computations. This primitive allows several parties who do not trust each other to work together to calculate the intersection of their secret sets without disclosing additional information about these sets. This allows users to jointly analyze data without revealing confidential information to each other. This paper describes a new protocol for the intersection of private sets for 3 or more participants. The protocol works in a network with a “ring” type topology which minimizes the number of necessary communication channels between users. The protocol is based on the idea of conditional zero-sharing which allows using a secret sharing scheme to determine whether an element of the set belongs to all users or not. To evaluate the performance of the proposed solution, a software implementation of the protocol in C++ is proposed. The security of the developed protocol for three or more users is shown, provided that users do not conspire with each other for an “Honest- But-Curious” attacker model. Proposed model implies that the attacker is one of the protocol participants who performs the protocol correctly, but can analyse the information obtained during this process to gain benefits. The security of the protocol is based only on the assumption that the attacker lacks information to obtain any useful data from the messages received during the protocol execution. Thus, this protocol is information-theoretically secure. The presented protocol can be used for confidential data analysis, for example, when several companies exchange information about common customers. The protocol allows three users to find the intersection of sets of sizes 106 in about 42 s. In the present implementation, it is possible to add multithreading or transfer large matrix calculations from the processor to the GPU.
Keywords
Постоянный URL
Articles in current issue
- Apochromatic objective for imaging spectral systems of visible, near and short-wave infrared spectrum ranges
- Application of the cross-gain modulation in erbium-doped fiber to increase the effective spectral bandwidth of an interrogator
Nonlinear transmission of fluorophosphate glass with quantum dots of cadmium and lead sulfides and selenides under near-IR femtosecond laser irradiation
Methodology for estimation of sensitivity to vibration of optical components based on wavelet analysis of vibration-modulated radiation
- Characterization of Ar:N2 plasma mixture with optical emission spectroscopy during deposition of NbN coating
- Spectral diagnostics of Al-Ni alloys under laser irradiation: effect of laser energy on plasma parameters
- Application of anamorphic optics system and a high-speed line scan photodetector in an open-type relative encoder
- A structural study of N-(2-(2-(2-azidoethoxy)ethoxy)ethyl)-4,6-di(aziridin-1-yl)-1,3,5-triazin-2-amine by density functional theory calculations
- A method for generating digital avatar animation with speech and non-verbal synchronization based on bimodal data
- Leveraging machine learning for profiling IoT devices to identify malicious activities
- Font generation based on style and character structure analysis using diffusion models
- Anomaly detection under data scarcity and uncertainty using zero-shot and few- shot approaches
- The impact of adversarial attacks on a computer vision models perception of images
- K-sparse encoder for efficient information retrieval
- Comparative analysis method for time series data objects represented as sets of strings based on de Bruijn graphs
- Application of modern methods for information security risks evaluation of a critical information infrastructure facility
- Optimizing knowledge distillation models for language models
- Algorithm for human interaction with a model of an industrial cyber-physical system by means of neural interface
- An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm
- Simulation and analytical model of reliability with possible replication of transmissions in a reconfigurable multipath wireless network
- Evaluating tram positioning accuracy on curves based on map data and segmented images
- Building an optimal refueling plan using aggregated information about route parameter values from open sources
- Hermite–Gauss wavelets: synthesis of discrete forms and investigation of properties