Paper 2021/1221

Simple, Fast Malicious Multiparty Private Set Intersection

Ofri Nevo, Ni Trieu, and Avishay Yanai

Abstract

We address the problem of multiparty private set intersection against a malicious adversary. First, we show that when one can assume no collusion amongst corrupted parties then there exists an extremely efficient protocol given only symmetric-key primitives. Second, we present a protocol secure against an adversary corrupting any strict subset of the parties. Our protocol is based on the recently introduced primitives: oblivious programmable PRF (OPPRF) and oblivious key-value store (OKVS). Our protocols follow the client-server model where each party is either a client or a server. However, in contrast to previous works where the client has to engage in an expensive interactive cryptographic protocol, our clients need only send a single key to each server and a single message to a {\em pivot} party (where message size is in the order of the set size). Our experiments show that the client's load improves by up to $10 \times$ (compared to both semi-honest and malicious settings) and that factor increases with the number of parties. We implemented our protocol and conducted an extensive experiment over both LAN and WAN and up to 32 parties with up to $2^{20}$ items each. We provide a comparison of the performance of our protocol and the state-of-the-art for both the semi-honest setting (by Chandran et al.) and the malicious setting (by Ben Efraim et al. and Garimella et al.).

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. ACM CCS 2021
DOI
10.1145/3460120.3484772
Keywords
private set intersectionpsi
Contact author(s)
ay yanay @ gmail com
History
2021-09-20: received
Short URL
https://ia.cr/2021/1221
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1221,
      author = {Ofri Nevo and Ni Trieu and Avishay Yanai},
      title = {Simple, Fast Malicious Multiparty Private Set Intersection},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1221},
      year = {2021},
      doi = {10.1145/3460120.3484772},
      url = {https://eprint.iacr.org/2021/1221}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.