基于等值测试的多方隐私集合求交方案
Multi-Party Privacy Set Intersection Scheme Based on Equivalence Testing
DOI: 10.12677/SEA.2023.126087, PDF,    国家自然科学基金支持
作者: 高 钦, 李子臣:北京印刷学院信息工程学院,北京
关键词: 隐私集合求交数据集合隐私性集合交集Privacy Set Intersection Data Set Privacy Set Intersection
摘要: 隐私集合求交(Private Set Intersection, PSI)技术可以在保护参与者私有数据集合隐私性的前提下计算出所有参与者的集合交集。作为隐私计算的关键技术,已经在云计算和数据挖掘等领域有了广泛的应用。密文等值测试(Equality Test)技术可以判断不同公钥加密下数据的异同。文中设计了基于密文等值测试技术的多方隐私集合求交方案,实现了不同公钥加密下私有数据集合的隐私求交,并利用等值测试的授权陷门技术将方案拓展为多方。此外,考虑到PSI的计算和存储代价,文中引入了云服务器来分担用户的计算和存储开销,并在半诚实模型下证明了方案的安全性。与现有方案相比,所提方案通信和计算代价较低,使用范围更广。
Abstract: Private Set Intersection (PSI) technology can calculate the set intersection of all participants while protecting the privacy of participants’ private data sets. As a key technology for privacy computing, it has been widely used in fields such as cloud computing and data mining. Ciphertext equality test technology can determine the similarities and differences of data encrypted by different public keys. This paper designs a multi-party privacy set intersection scheme based on ciphertext equivalence testing technology, realizes the privacy intersection of private data sets under different public key encryption, and uses the authorization trapdoor technology of equivalence testing to extend the scheme to multiple parties. In addition, considering the computing and storage costs of, the paper introduces a cloud server to share the user’s computing and storage overhead, and proves the security of the scheme under the semi-honest model. Compared with existing solutions, the proposed solution has lower communication and calculation costs and a wider range of applications.
文章引用:高钦, 李子臣. 基于等值测试的多方隐私集合求交方案[J]. 软件工程与应用, 2023, 12(6): 895-907. https://doi.org/10.12677/SEA.2023.126087

参考文献

[1] Meadows, C. (1986) A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. 1986 IEEE Symposium on Security and Privacy, Oakland, 7-9 April 1986, 134-134. [Google Scholar] [CrossRef
[2] Huang, Y., Evans, D. and Katz, J. (2012) Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
[3] Pinkas, B., Schneider, T., Weinert, C., et al. (2018) Efficient Circuit-Based PSI via Cuckoo Hashing. 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, 29 April-3 May 2018, 125-157. [Google Scholar] [CrossRef
[4] Dong, C., Chen, L. and Wen, Z. (2013) When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 4-8 November 2013, 789-800. [Google Scholar] [CrossRef
[5] Kolesnikov, V. and Kumaresan, R. (2013) Improved OT Extension for Transferring Short Secrets. 33rd Annual Cryptology Conference, Santa Barbara, 18-22 August 2013, 54-70. [Google Scholar] [CrossRef
[6] Yang, K., Weng, C., Lan, X., et al. (2020) Ferret: Fast Extension for Correlated OT with Small Communication. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 9-13 November 2020, 1607-1626. [Google Scholar] [CrossRef
[7] Freedman, M.J., Nissim, K. and Pinkas, B. (2004) Efficient Private Matching and Set Intersection. Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2-6 May 2004, 1-19. [Google Scholar] [CrossRef
[8] Vos, J., Conti, M. and Erkin, Z. (2022) Fast Multi-Party Private Set Operations in the Star Topology from Secure ANDs and ORs. Cryptology ePrint Archive.
[9] Sang, Y. and Shen, H. (2007) Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors. 8th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), Adelaide, 3-6 December 2007. 461-468. [Google Scholar] [CrossRef
[10] Kamara, S., Mohassel, P., Raykova, M., et al. (2014) Scaling Private Set Intersection to Billion-Element Sets. Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, 3-7 March 2014, 195-215. [Google Scholar] [CrossRef
[11] Baldi, P., Baronio, R., De Cristofaro, E., et al. (2011) Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes. Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, 17-21 October 2011, 691-702. [Google Scholar] [CrossRef
[12] 魏立斐, 刘纪海, 张蕾. 面向隐私保护的集合交集计算综述[J]. 计算机研究与发展, 2022, 59(8): 1782-1799.
[13] Yang, G., Tan, C.H., Huang, Q., et al. (2010) Probabilistic Public Key Encryption with Equality Test. Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, 1-5 March 2010, 119-131. [Google Scholar] [CrossRef
[14] Tang, Q. (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, 11-13 July 2011, 389-406. [Google Scholar] [CrossRef
[15] Ma, S., Zhong, Y. and Huang, Q. (2022) Efficient Public Key Encryption with Outsourced Equality Test for Cloud-Based IoT Environments. IEEE Transactions on Information Forensics and Security, 17, 3758-3772. [Google Scholar] [CrossRef
[16] Xu, Y., Wang, M., Zhong, H., et al. (2017) Verifiable Public Key Encryption Scheme with Equality Test in 5G Networks. IEEE Access, 5, 12702-12713. [Google Scholar] [CrossRef
[17] Wang, Y., Huang, Q., Li, H., et al. (2021) Private Set Intersection with Authorization over Outsourced Encrypted Datasets. IEEE Transactions on Information Forensics and Security, 16, 4050-4062. [Google Scholar] [CrossRef
[18] Kissner, L. and Song, D. (2005) Privacy-Preserving Set Operations. 25th Annual International Cryptology Conference, Santa Barbara, 14-18 August 2005, 241-257. [Google Scholar] [CrossRef
[19] Hazay, C. and Venkitasubramaniam, M. (2017) Scalable Multi-Party Private Set-Intersection. 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, 28-31 March 2017, 175-203. [Google Scholar] [CrossRef
[20] Bay, A., Erkin, Z., Alishahi, M., et al. (2021) Multi-Party Private Set Intersection Protocols for Practical Applications. Proceedings of the 18th International Conference on Security and Cryptography SECRYPT, 1, 515-522. [Google Scholar] [CrossRef