Cryptology ePrint Archive: Report 2019/1338

Two-party Private Set Intersection with an Untrusted Third Party

Phi Hung Le and Samuel Ranellucci and S. Dov Gordon

Abstract: We construct new protocols for two parties to securely compute on the items in their intersection. Our protocols make use of an untrusted third party that has no input. The use of this party allows us to construct highly efficient protocols that are secure against a single malicious corruption.

Category / Keywords: cryptographic protocols / Private Set Intersection

Original Publication (with minor differences): ACM CCS 2019

Date: received 20 Nov 2019

Contact author: ple13 at gmu edu

Available format(s): PDF | BibTeX Citation

Version: 20191122:182344 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]