Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
@article{Chase2020PrivateSI, title={Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF}, author={Melissa Chase and Peihan Miao}, journal={IACR Cryptol. ePrint Arch.}, year={2020}, volume={2020}, pages={729}, url={https://api.semanticscholar.org/CorpusID:220126483} }
We present a new protocol for two-party private set intersection (PSI) with semi-honest security in the plain model and one-sided malicious security in the random oracle model. Our protocol achieves…
Topics
Multi-Point OPRF (opens in a new tab)PSI Protocols (opens in a new tab)Oblivious Pseudorandom Functions (opens in a new tab)PRF Key (opens in a new tab)PRF Value (opens in a new tab)OT Extension (opens in a new tab)Symmetric Key Operations (opens in a new tab)Stash Size (opens in a new tab)Oblivious PRFs (opens in a new tab)Base OTs (opens in a new tab)
163 Citations
Efficient Multi-Party Private Set Intersection with Better Security
- 2024
Computer Science, Mathematics
This work introduces Zero-share-Xor Garbled Bloom Filter and an efficient PSI protocol using oblivious pseudorandom function (OPRF) and demonstrates optimal concurrency under star-like and path-like communication graphs.
Compact and Malicious Private Set Intersection for Small Sets
- 2021
Computer Science, Mathematics
This protocol is proven secure against malicious parties, in the ideal permutation + random oracle model, and requires the least time and communication of any known PSI protocol, even those that are only semi-honest secure and ones that are not based on Diffie-Hellman.
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
- 2021
Computer Science, Mathematics
This paper presents a concretely efficient protocol for private set intersection (PSI) in the multi-party setting using oblivious pseudorandom function (OPRF) and proves the security of the protocol against semi-honest adversaries.
Probabilistic Attacks and Enhanced Security for “Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF”
Computer Science, Mathematics
An impressive construction “Pri-vate set intersection in the Internet setting from lightweight oblivious prf” (CM20 for short) at Crypto 2020, highlighting its convenient structure and optimal communication cost, however, it does have some security vulnerabilities.
Hiding the input-size in multi-party private set intersection
- 2023
Computer Science
Based on the Bloom filter, threshold homomorphic encryption and marking technique, the proposed protocol supports the private set intersection among multiple participants and is proved to be secure against semi-honest participants under the decisional composite residuosity assumption.
Simple, Fast Malicious Multiparty Private Set Intersection
- 2021
Computer Science
We address the problem of multiparty private set intersection against a malicious adversary. First, we show that when one can assume no collusion amongst corrupted parties then there exists an…
Towards Efficient Delegated Private Set Intersection Cardinality Protocol
- 2024
Computer Science
This work designed an efficient PSI-CA protocol based on technologies such as PRF and OKVS that is secure under the semi-honest security model and does not leak the private information of the participants.
A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF
- 2023
Computer Science
The proposed MPSI uses oblivious transfer together with a probe-and-XOR of strings (PaXoS) as the main building blocks and provides one-sided malicious security, but also achieves a better balance between communication and computational overhead.
DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF
- 2024
Computer Science
DMPSI is proposed, an efficient delegated PSI (with cardinality) protocol in a multiparty setting that avoids using heavy cryptographic primitives and is scalable in the number of clients and the set size.
A Delegated Offline Private Set Intersection Protocol for Cloud Computing Environments
- 2022
Computer Science
This paper designs an efficient PSI protocol based on oblivious transfer, oblivious pseudo-random function, and cuckoo filter for the cloud environments that allows clients to upload encrypted private data sets to the cloud server, and the server can act as its agent to perform intersection calculations even when the client is offline.
40 References
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
- 2019
Computer Science
This work describes a novel approach for two-party private set intersection (PSI) with semi-honest security that has the lowest monetary cost of any known PSI protocol, when run over the Internet using cloud-based computing services.
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- 2010
Computer Science
This paper constructs PSI and Authorized PSI (APSI) protocols secure in the malicious model under standard cryptographic assumptions, with both linear communication and computational complexities, and is the first solution to do so.
Malicious-Secure Private Set Intersection via Dual Execution
- 2017
Computer Science
This work introduces a new PSI protocol that is secure in the presence of malicious adversaries and is based entirely on fast symmetric-key primitives and inherits important techniques from state-of-the-art protocols in the semi-honest setting.
Faster Private Set Intersection Based on OT Extension
- 2014
Computer Science
The most recent efficiency improvements in OT extension are taken to propose significant optimizations to previous PSI protocols and to suggest a new PSI protocol whose runtime is superior to that of existing protocols.
Scalable Private Set Intersection Based on OT Extension
- 2016
Computer Science
This article focuses on PSI protocols that are secure against semi-honest adversaries and take advantage of the most recent efficiency improvements in Oblivious Transfer (OT) extension, proposes significant optimizations to previous PSi protocols, and suggests a new PSI protocol whose runtime is superior to that of existing protocols.
PSI from PaXoS: Fast, Malicious Private Set Intersection
- 2020
Computer Science
We present a 2-party private set intersection (PSI) protocol which provides security against malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of Kolesnikov…
Fast Private Set Intersection from Homomorphic Encryption
- 2017
Computer Science, Mathematics
This work uses fully homomorphic encryption to construct a fast PSI protocol with a small communication overhead that works particularly well when one of the two sets is much smaller than the other, and is secure against semi-honest adversaries.
Efficient Private Matching and Set Intersection
- 2004
Computer Science, Mathematics
This work considers the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain, and presents protocols, based on the use of homomorphic encryption and balanced hashing, for both semi-honest and malicious environments.
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions
- 2017
Computer Science
This work presents a novel protocol tackling the Intersection-Sum problem, and proves security of the protocol in the honest-but-curious model, which allows aborting if the intersection is too small, in which case neither party learns the intersection-sum.
Improved Private Set Intersection Against Malicious Adversaries
- 2017
Computer Science, Mathematics
Improvements to practical PSI provide security in the presence of malicious adversaries, as well as theoretical improvements to private set intersection.