首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
【24h】

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

机译:线性复杂性私有设备在恶意模型中安全的交叉协议

获取原文

摘要

Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such that the client learns nothing other than the set intersection and the server learns nothing beyond client input size. Prior work yielded a range of PSI protocols secure under different cryptographic assumptions. Protocols operating in the semi-honest model offer better (linear) complexity while those in the malicious model are often significantly more costly. In this paper, we construct PSI and Authorized PSI (APSI) protocols secure in the malicious model under standard cryptographic assumptions, with both linear communication and computational complexities. To the best of our knowledge, our APSI is the first solution to do so. Finally, we show that our linear PSI is appreciably more efficient than the state-of-the-art.
机译:私有设置交叉点(PSI)协议允许一方(“客户端”)计算与另一方(“服务器”)的输入集的交叉点(例如,除了设置的交叉点之外,客户端并未学习,并且服务器没有学习超越客户端输入大小。在不同的加密假设下,在不同的PSI协议中产生了一系列PSI协议。在半诚实模型中运行的协议提供更好的(线性)复杂性,而恶意模型的那些往往更昂贵。在本文中,我们在标准加密假设下构建了PSI和授权的PSI(APSI)协议在标准加密假设下的恶意模型,具有线性通信和计算复杂性。据我们所知,我们的APSI是第一个解决方案。最后,我们表明我们的线性PSI明显高于最先进的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号