Size-hiding in private set intersection: Existential results and constructions

8Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we focus our attention on private set intersection. We show impossibility and existential results, and we provide some explicit constructions. More precisely, we start by looking at the case in which both parties, client and server, in securely computing the intersection, would like to hide the sizes of their sets of secrets, and we show that: - It is impossible to realize an unconditionally secure size-hiding set intersection protocol. - In a model where a TTP provides set up information to the two parties and disappears, unconditionally secure size-hiding set intersection is possible. - There exist computationally secure size-hiding set intersection protocols. Then, we provide some explicit constructions for one-sided protocols, where only the client gets the intersection and hides the size of her set of secrets. In the model with the TTP, we design two protocols which are computationally secure under standard assumptions, and two very efficient protocols which are secure in the random oracle model. We close the paper with some remarks and by pointing out several interesting open problems. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

D’Arco, P., González Vasco, M. I., Pérez Del Pozo, A. L., & Soriente, C. (2012). Size-hiding in private set intersection: Existential results and constructions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7374 LNCS, pp. 378–394). https://doi.org/10.1007/978-3-642-31410-0_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free