Paper 2019/1338

Two-party Private Set Intersection with an Untrusted Third Party

Phi Hung Le, Samuel Ranellucci, and S. Dov Gordon

Abstract

We construct new protocols for two parties to securely compute on the items in their intersection. Our protocols make use of an untrusted third party that has no input. The use of this party allows us to construct highly efficient protocols that are secure against a single malicious corruption.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. ACM CCS 2019
DOI
10.1145/3319535.3345661
Keywords
Private Set Intersection
Contact author(s)
ple13 @ gmu edu
History
2019-11-22: received
Short URL
https://ia.cr/2019/1338
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1338,
      author = {Phi Hung Le and Samuel Ranellucci and S.  Dov Gordon},
      title = {Two-party Private Set Intersection with an Untrusted Third Party},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1338},
      year = {2019},
      doi = {10.1145/3319535.3345661},
      note = {\url{https://eprint.iacr.org/2019/1338}},
      url = {https://eprint.iacr.org/2019/1338}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.