Phasing: Private Set Intersection using Permutation-based Hashing

Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

185 Scopus citations

Abstract

Private Set Intersection (PSI) allows two parties to compute the intersection of private sets while revealing nothing more than the intersection itself. PSIneeds to be applied to large data sets in scenarios such as measurement of ad conversion rates, data sharing, or contact discovery. Existing PSI protocols do not scale up well, and therefore some applications use insecure solutions instead. We describe a new approach for designing PSI protocols based on permutation-based hashing, which enables to reduce the length of items mapped to bins while ensuring that no collisions occur. We denote this approach as Phasing, for Permutation-based Hashing Set Intersection. Phasing can dramatically improve the performance of PSI protocols whose overhead depends on the length of the representations of input items. We apply Phasing to design a new approach for circuit-based PSI protocols. The resulting protocol is up to 5 times faster than the previously best Sort-Compare-Shuffle circuit of Huang et al. (NDSS 2012). We also apply Phasing to the OT-based PSI protocol of Pinkas et al. (USENIX Security 2014), which is the fastest PSI protocol to date. Together with additional improvements that reduce the computation complexity by a logarithmic factor, the resulting protocol improves run-time by a factor of up to 20 and can also have similar communication overhead as the previously best PSI protocol in that respect. The new protocol is only moderately less efficient than an insecure PSI protocol that is currently used by real-world applications, and is therefore the first secure PSI protocol that is scalable to the demands and the constraints of current real-world settings.

Original languageEnglish
Title of host publicationProceedings of the 24th USENIX Security Symposium
PublisherUSENIX Association
Pages515-530
Number of pages16
ISBN (Electronic)9781931971232
StatePublished - 2015
Event24th USENIX Security Symposium - Washington, United States
Duration: 12 Aug 201514 Aug 2015

Publication series

NameProceedings of the 24th USENIX Security Symposium

Conference

Conference24th USENIX Security Symposium
Country/TerritoryUnited States
CityWashington
Period12/08/1514/08/15

Bibliographical note

Publisher Copyright:
© 2015 Proceedings of the 24th USENIX Security Symposium. All rights reserved.

Fingerprint

Dive into the research topics of 'Phasing: Private Set Intersection using Permutation-based Hashing'. Together they form a unique fingerprint.

Cite this