Phasing: Private Set Intersection using Permutation-based Hashing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Private Set Intersection (PSI) allows two parties to compute the intersection of private sets while revealing nothing more than the intersection itself. PSIneeds to be applied to large data sets in scenarios such as measurement of ad conversion rates, data sharing, or contact discovery. Existing PSI protocols do not scale up well, and therefore some applications use insecure solutions instead. We describe a new approach for designing PSI protocols based on permutation-based hashing, which enables to reduce the length of items mapped to bins while ensuring that no collisions occur. We denote this approach as Phasing, for Permutation-based Hashing Set Intersection. Phasing can dramatically improve the performance of PSI protocols whose overhead depends on the length of the representations of input items. We apply Phasing to design a new approach for circuit-based PSI protocols. The resulting protocol is up to 5 times faster than the previously best Sort-Compare-Shuffle circuit of Huang et al. (NDSS 2012). We also apply Phasing to the OT-based PSI protocol of Pinkas et al. (USENIX Security 2014), which is the fastest PSI protocol to date. Together with additional improvements that reduce the computation complexity by a logarithmic factor, the resulting protocol improves run-time by a factor of up to 20 and can also have similar communication overhead as the previously best PSI protocol in that respect. The new protocol is only moderately less efficient than an insecure PSI protocol that is currently used by real-world applications, and is therefore the first secure PSI protocol that is scalable to the demands and the constraints of current real-world settings.

Original languageEnglish
Title of host publicationProceedings of the 24th USENIX Security Symposium
PublisherUSENIX Association
Pages515-530
Number of pages16
ISBN (Electronic)9781931971232
StatePublished - 2015
Event24th USENIX Security Symposium, USENIX Security, 2015 - Washington, United States
Duration: 12 Aug 201514 Aug 2015

Publication series

NameProceedings of the 24th USENIX Security Symposium

Conference

Conference24th USENIX Security Symposium, USENIX Security, 2015
Country/TerritoryUnited States
CityWashington
Period12/08/1514/08/15

Bibliographical note

Publisher Copyright:
© 2015 Proceedings of the 24th USENIX Security Symposium. All rights reserved.

Funding

Acknowledgements: We thank Elaine Shi and the anonymous reviewers of USENIX Security 2015 for their helpful comments. This work was supported by the European Union’s 7th Framework Program (FP7/2007-2013) under grant agreement n. 609611 (PRACTICE) and via a Marie Curie Career Integration Grant, by the DFG as part of project E3 within the CRC 1119 CROSSING, by the German Federal Ministry of Education and Research (BMBF) within EC SPRIDE, by the Hessian LOEWE excellence initiative within CASED, by a grant from the Israel Ministry of Science and Technology (grant 3-9094), by a Magneton grant of the Israeli Ministry of Economy, by the Israel Science Foundation (Grant No. 483/13), and by the Israeli Centers of Research Excellence (I-CORE) Program (Center No. 4/11).

FundersFunder number
EC SPRIDE
Israeli Ministry of Economy
Seventh Framework Programme609611
Deutsche Forschungsgemeinschaft
Bundesministerium für Bildung und Forschung
Israel Science Foundation483/13
Israeli Centers for Research Excellence4/11
Ministry of science and technology, Israel3-9094

    Fingerprint

    Dive into the research topics of 'Phasing: Private Set Intersection using Permutation-based Hashing'. Together they form a unique fingerprint.

    Cite this