Abstract
While there has been a lot of progress in designing efficient custom protocols for computing Private Set Intersection (PSI), there has been less research on using generic Multi-Party Computation (MPC) protocols for this task. However, there are many variants of the set intersection functionality that are not addressed by the existing custom PSI solutions and are easy to compute with generic MPC protocols (e.g., comparing the cardinality of the intersection with a threshold or measuring ad conversion rates). Generic PSI protocols work over circuits that compute the intersection. For sets of size n, the best known circuit constructions conduct$$O(n \log n)$$ or$$O(n \log n / \log \log n)$$ comparisons (Huang et al., NDSS’12 and Pinkas et al., USENIX Security’15). In this work, we propose new circuit-based protocols for computing variants of the intersection with an almost linear number of comparisons. Our constructions are based on new variants of Cuckoo hashing in two dimensions. We present an asymptotically efficient protocol as well as a protocol with better concrete efficiency. For the latter protocol, we determine the required sizes of tables and circuits experimentally, and show that the run-time is concretely better than that of existing constructions. The protocol can be extended to a larger number of parties. The proof technique presented in the full version for analyzing Cuckoo hashing in two dimensions is new and can be generalized to analyzing standard Cuckoo hashing as well as other new variants of it.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings |
Editors | Jesper Buus Nielsen, Vincent Rijmen |
Publisher | Springer Verlag |
Pages | 125-157 |
Number of pages | 33 |
ISBN (Print) | 9783319783710 |
DOIs | |
State | Published - 2018 |
Event | 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018 - Tel Aviv, Israel Duration: 29 Apr 2018 → 3 May 2018 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 10822 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018 |
---|---|
Country/Territory | Israel |
City | Tel Aviv |
Period | 29/04/18 → 3/05/18 |
Bibliographical note
Publisher Copyright:© 2018, International Association for Cryptologic Research.
Funding
Acknowledgments. We thank Oleksandr Tkachenko for his invaluable help with the implementation and benchmarking. We also thank Moni Naor for suggesting the application to achieve differential privacy. This work has been co-funded by the DFG as part of project E4 within the CRC 1119 CROSSING and by the German Federal Ministry of Education and Research (BMBF), the Hessen State Ministry for Higher Education, Research and the Arts (HMWK) within CRISP, and the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. Calculations for this research were conducted on the Lichtenberg high performance computer of the TU Darmstadt.
Funders | Funder number |
---|---|
HMWK | |
Deutsche Forschungsgemeinschaft | |
Bundesministerium für Bildung und Forschung | |
Hessisches Ministerium für Wissenschaft und Kunst |
Keywords
- Private set intersection
- Secure computation