|
| | | |
Privacy Preserving Set Intersection Protocol Based on Bilinear Group
Sang, Y. and Shen, H.
We propose a more efficient privacy preserving set
intersection protocol which improves the previously
known result by a factor of O(N) in both the computation and communication complexities (N is the
number of parties in the protocol). Our protocol
is obtained in the malicious model, in which we assume a probabilistic polynomial-time bounded adversary actively controls a fixed set of t (t < N/2) parties. We use a (t + 1,N)-threshold version of the
Boneh-Goh-Nissim (BGN) cryptosystem whose underlying group supports bilinear maps. The BGN
cryptosystem is generally used in applications where
the plaintext space should be small, because there
is still a Discrete Logarithm (DL) problem after the
decryption. In our protocol the plaintext space can
be as large as bounded by the security parameter \tau,
and the intractability of DL problem is utilized to
protect the private datasets. Based on the bilinear
map, we also construct some efficient non-interactive
proofs. The security of our protocol can be reduced
to the common intractable problems including the
random oracle, subgroup decision and discrete logarithm problems. The computation complexity of
our protocol is O(NS^2\tau^3) (S is the cardinality of
each party's dataset), and the communication complexity is O(NS^2\tau) bits. A similar work by Kissner
et al. needs O(N^2S^2\tau3) computation complex-
ity and O(N^2S^2\tau) communication complexity for the
same level of correctness as ours. |
Cite as: Sang, Y. and Shen, H. (2008). Privacy Preserving Set Intersection Protocol Based on Bilinear Group. In Proc. Thirty-First Australasian Computer Science Conference (ACSC 2008), Wollongong, NSW, Australia. CRPIT, 74. Dobbie, G. and Mans, B., Eds. ACS. 47-54. |
(from crpit.com)
(local if available)
|
|