In this paper we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. Specifically, our protocols require $O(n^2k\lambda)$ bits of communication and $\tilde{O}(n^2\lambda+(n\lambda+n^2)k)$ group multiplications per player in the malicious adversary setting, where $k$ is the size of each dataset and $\lambda$ is security parameter. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representation of the polynomials associated with users' datasets, and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently.
Category / Keywords: Privacy-preserving set operation, privacy-preserving set intersection Date: received 6 Oct 2010, last revised 6 Oct 2010 Contact author: jhsbhs at gmail com Available format(s): PDF | BibTeX Citation Version: 20101007:140646 (All versions of this report) Short URL: ia.cr/2010/512 Discussion forum: Show discussion | Start new discussion