Paper 2019/723
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, and Moti Yung
Abstract
In this work, we discuss our successful efforts for industry deployment of a cryptographic secure computation protocol. The problem we consider is privately computing aggregate conversion rate of advertising campaigns. This underlying functionality can be abstracted as Private Intersection-Sum (PI-Sum) with Cardinality. In this setting two parties hold datasets containing user identifiers, and one of the parties additionally has an integer value associated with each of its user identifiers. The parties want to learn the number of identifiers they have in common and the sum of the integer values associated with these users without revealing any more information about their private inputs. We identify the major properties and enabling factors which make the deployment of a cryptographic protocol possible, practical, and uniquely positioned as a solution for the task at hand. We describe our deployment setting and the most relevant efficiency measure, which in our setting is communication overhead rather than computation. We also present a monetary cost model that can be used as a unifying cost measure and the computation model which reflect out use-case: a low-priority batch computing. We present three PI-Sum with cardinality protocols: our currently deployed protocol, which relies on a Diffie-Hellman style double masking, and two new protocols which leverage more recent techniques for private set intersection (PSI) that use Random Oblivious Transfer and encrypted Bloom filters. We compare the later two protocol with our original solution when instantiated with different additively homomorphic encryption schemes. We implement our constructions and compare their costs. We also compare with recent generic approaches for computing on the intersection of two datasets and show that our best protocol has monetary cost that is 20× less than the best known generic approach.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Minor revision. Euro S&P 2020
- Keywords
- secure computationprivate intersection-sumsecure aggregate ad conversion
- Contact author(s)
-
mion @ google com
karn @ google com
sarvar @ google com
marianar @ google com
benkreuter @ google com
moti @ google com - History
- 2020-09-07: revised
- 2019-06-18: received
- See all versions
- Short URL
- https://ia.cr/2019/723
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/723, author = {Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/723}, year = {2019}, url = {https://eprint.iacr.org/2019/723} }