Paper 2017/1064

An Algebraic Approach to Maliciously Secure Private Set Intersection

Satrajit Ghosh and Tobias Nilges

Abstract

Private set intersection is an important area of research and has been the focus of many works over the past decades. It describes the problem of finding an intersection between the input sets of at least two parties without revealing anything about the input sets apart from their intersection. In this paper, we present a new approach to compute the intersection between sets based on a primitive called Oblivious Linear Function Evaluation (OLE). On an abstract level, we use this primitive to efficiently add two polynomials in a randomized way while preserving the roots of the added polynomials. Setting the roots of the input polynomials to be the elements of the input sets, this directly yields an intersection protocol with optimal asymptotic communication complexity $O(m\kappa)$. We highlight that the protocol is information-theoretically secure assuming OLE. We also present a natural generalization of the 2-party protocol for the fully malicious multi-party case. Our protocol does away with expensive (homomorphic) threshold encryption and zero-knowledge proofs. Instead, we use simple combinatorial techniques to ensure the security. As a result we get a UC-secure protocol with asymptotically optimal communication complexity $O((n^2+nm)\kappa)$, where $n$ is the number of parties, $m$ is the set size and $\kappa$ the security parameter. Apart from yielding an asymptotic improvement over previous works, our protocols are also conceptually simple and require only simple field arithmetic. Along the way we develop tools that might be of independent interest.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Private set intersectionthreshold private set intersectionoblivious linear function evaluationmulti-partyUC-security
Contact author(s)
satrajit @ cs au dk
History
2018-05-21: last of 2 revisions
2017-11-09: received
See all versions
Short URL
https://ia.cr/2017/1064
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/1064,
      author = {Satrajit Ghosh and Tobias Nilges},
      title = {An Algebraic Approach to Maliciously Secure Private Set Intersection},
      howpublished = {Cryptology ePrint Archive, Paper 2017/1064},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/1064}},
      url = {https://eprint.iacr.org/2017/1064}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.