An Efficient Toolkit for Computing Private Set Operations. / Davidson, Alexander; Cid, Carlos.

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. ed. / Josef Pieprzyk; Suriadi Suriadi. Vol. 2 Springer Heidelberg, 2017. p. 261-278 (Lecture Notes in Computer Science; Vol. 10343).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Documents

Abstract

Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such protocols have an ever-increasing number of practical applications, particularly when implementing privacy-preserving data mining schemes. Protocols for computing private set operations have been prevalent in multi-party computation literature over the past decade, and in the case of private set intersection (PSI), have become practically feasible to run in real applications. In contrast, other set operations such as union have received less attention from the research community, and the few existing designs are often limited in their feasibility. In this work we aim to fill this gap, and present a new technique using Bloom filter data structures and additive homomorphic encryption to develop the first private set union protocol with both linear computation and communication complexities. Moreover, we show how to adapt this protocol to give novel ways of computing PSI and private set intersection/union cardinality with only minor changes to the protocol computation. Our work resembles therefore a toolkit for scalable private set computation with linear complexities, and we provide a thorough experimental analysis that shows that the online phase of our designs is practical up to large set sizes.
Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II
EditorsJosef Pieprzyk, Suriadi Suriadi
PublisherSpringer Heidelberg
Pages261-278
Number of pages18
Volume2
ISBN (Electronic)978-3-319-59870-3
ISBN (Print)978-3-319-59869-7
DOIs
Publication statusPublished - 2017
EventACISP 2017 - 22nd Australasian Conference on Information Security and Privacy - Auckland, New Zealand
Duration: 3 Jul 20175 Jul 2017
http://acisp.massey.ac.nz/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer, Cham
Volume10343

Conference

ConferenceACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
CountryNew Zealand
CityAuckland
Period3/07/175/07/17
Internet address
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 27988686