Paper 2024/1239

Efficient Differentially Private Set Intersection

Xinyu Peng, Zhejiang University, Alibaba Group (China)
Yufei Wang, DAMO Academy, Alibaba Group, Hupan Lab
Weiran Liu, Alibaba Group (China)
Liqiang Peng, Alibaba Group (China)
Feng Han, Alibaba Group (China)
Zhen Gu, DAMO Academy, Alibaba Group, Hupan Lab
Jianling Sun, Zhejiang University
Yuan Hong, University of Connecticut
Abstract

Private Set Intersection (PSI) enables a sender and a receiver to jointly compute the intersection of their sets without disclosing other information about items not in the intersection. However, in many cases of joint data analysis, it is not just the items outside the intersection that are sensitive but the items within it. To protect such sensitive information, prior work presents a Differentially Private version of PSI (DPSI) based on a circuit-PSI using Fully Homomorphic Encryption. However, their concrete protocol is somewhat inefficient compared with the state-of-the-art (SOTA) circuit-PSI. In this paper, we revisit the DPSI definition and formalize its ideal functionality. We identify the key desiderata required by PSI-related tools to construct DPSI and propose two frameworks to construct efficient DPSI protocols. The first one generalizes the idea of existing DPSI, showing that any circuit-PSI can be used to construct DPSI. We obtain a more efficient DPSI protocol by plugging the SOTA circuit-PSI protocol in the framework. The second one helps to obtain a more efficient DPSI protocol based on the multi-query Reverse Private Membership Test (mqRPMT) that was previously used to construct Private Set Operation (PSO). However, mqRPMT additionally leaks the intersection size to the sender. We bound such leakage using differential privacy by padding random dummy items in input sets. We implement numerous constructions based on our frameworks. Experiments show that our protocols significantly outperform the existing DPSI construction, 2.5-22.6$\times$ more communication efficient and up to 110.5-151.8$\times$ faster. Our work also shows a new use case for mqRPMT besides obtaining PSO.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
differential privacyprivate set intersection
Contact author(s)
steven pxy @ alibaba-inc com
wangyufei wyf @ alibaba-inc com
weiran lwr @ alibaba-inc com
plq270998 @ alibaba-inc com
fengdi hf @ alibaba-inc com
guzhen gz @ alibaba-inc com
sunjl @ zju edu cn
yuan hong @ uconn edu
History
2024-08-07: approved
2024-08-05: received
See all versions
Short URL
https://ia.cr/2024/1239
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1239,
      author = {Xinyu Peng and Yufei Wang and Weiran Liu and Liqiang Peng and Feng Han and Zhen Gu and Jianling Sun and Yuan Hong},
      title = {Efficient Differentially Private Set Intersection},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1239},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1239}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.