skip to main content
10.1145/2245276.2232008acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Collusion-resistant outsourcing of private set intersection

Published: 26 March 2012 Publication History

Abstract

Set intersection is a building block for many data analysis techniques, e.g. in data mining. Private set intersection enables to compute the set intersection without revealing the non-matching items. The advent of cloud computing drives the desire to outsource such computations, but without the need to trust the service provider. Homomorphic encryption enables secure, outsourced computations, but in case of multiple clients cannot prevent collusion.
In this paper we present non-interactive, encrypted computation of the set intersection using an untrusted service provider. Two or more clients submit their encrypted sets to the service provider which facilitates the computation of their intersection. The service provider either learns the intersection or remains completely obvious to both input and output - including the intersection's size. We prove our protocols secure in the random oracle model and under the RSA assumption. Our prototypical implementation shows the difference between the protocols using different cryptographic techniques and that even a fully untrusted service provider can be practically feasible.

References

[1]
G. Ateniese, E. De Cristofaro, and G. Tsudik. (If) Size Matters: Size-Hiding Private Set Intersection. Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, 2011.
[2]
M. Bellare, A. Boldyreva, and A. OŠNeill. Deterministic and Efficiently Searchable Encryption. Proceedings of CRYPTO, 2007.
[3]
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. Proceedings of EUROCRYPT, 2004.
[4]
D. Boneh, and M. Franklin. Efficient Generation of Shared RSA Keys. Journal of the ACM 48(4), 2001.
[5]
D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. Proceedings of the 2nd Theory of Cryptography Conference, 2005.
[6]
D. Chaum. Blind Signatures for Untraceable Payments. Proceedings of CRYPTO, 1983.
[7]
K. Chung, Y. Kalai, and S. Vadhan. Improved Delegation of Computation Using Fully Homomorphic Encryption. Proceedings of CRYPTO, 2010.
[8]
D. Dachman-Soled, T. Malkin, M. Raykova, and Moti Yung. Efficient Robust Private Set Intersection. Proceedings of the 7th International Conference on Applied Cryptography and Network Security, 2009.
[9]
E. De Cristofaro, J. Kim, and G. Tsudik. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. Proceedings of ASIACRYPT, 2010.
[10]
E. De Cristofaro, Y. Lu, and G. Tsudik. Efficient Techniques for Privacy-preserving Sharing of Sensitive Information. Proceedings of the International Conference on Trust and Trustworthy Computing, 2011.
[11]
E. De Cristofaro, and G. Tsudik. Practical Private Set Intersection Protocols with Linear Complexity. Proceedings of the 14th International Conference on Financial Cryptography and Data Security, 2010.
[12]
M. Van Dijk, and A. Juels. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. Proceedings of the 5th USENIX Conference on Hot Topics in Security, 2010.
[13]
Y. Frankel, P. MacKenzie, and M. Yung. Robust Efficient Distributed RSA-Key Generation. Proceedings of the 30th ACM Aymposium on Theory of Computing, 1998.
[14]
M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. Proceedings of the 2nd Theory of Cryptography Conference, 2005.
[15]
M. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. Proceedings of EUROCRYPT, 2004.
[16]
H. Garcia-Molina, J. Ullman, and J. Widom. Database Systems: The Complete Book. Prentice Hall, 2008.
[17]
R. Gennaro, C. Gentry, and B. Parno. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. Proceedings of CRYPTO, 2010.
[18]
C. Gentry. Fully Homomorphic Encryption using Ideal Lattices. Proceedings of the 41st ACM Symposium on Theory of Computing, 2009.
[19]
O. Goldreich. Foundations of Cryptography: Basic Applications. Cambridge University Press, 2004.
[20]
S. Goldwasser, and S. Micali. Probabilistic Encryption. Journal of Computer and Systems Science 28(2), 1984.
[21]
H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-Service-Provider Model. Proceedings of the ACM Symposium on Principles Database and Systems, 2002.
[22]
H. Hacigümüs, S. Mehrotra, and B. Iyer. Providing Database as a Service. Proceedings of the IEEE International Conference on Data Engineering, 2002.
[23]
C. Hazay, and Y. Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. Proceedings of the 5th Theory of Cryptography Conference, 2008.
[24]
C. Hazay, and K. Nissim. Efficient Set Operations in the Presence of Malicious Adversaries. Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, 2010.
[25]
S. Jarecki and X. Liu. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. Proceedings of the 6th Theory of Cryptography Conference, 2009.
[26]
L. Kissner, and D. Song. Privacy-Preserving Set Operations. Proceedings of CRYPTO, 2005.
[27]
M. Naor, and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. Proceedings of the 31st Symposium on Theory of Computer Science, 1999.
[28]
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proceedings of EUROCRYPT, 1999.
[29]
M. Raykova, B. Vo, S. Bellovin, and T. Malkin. Secure Anonymous Database Search. Proceedings of the ACM Cloud Computing Security Workshop, 2009.
[30]
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 1978.
[31]
D. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. Proceedings of IEEE Symposium on Security and Privacy, 2000.
[32]
P. Tan, M. Steinbach, and V. Kumar. Introduction to Data Mining. Addison-Wesley, 2005.
[33]
J. Vaidya, C. Clifton, and Y. Zhu. Privacy Preserving Data Mining. Sprinter - Advances in Information Security 19, 2006.
[34]
A. Yao. Protocols for Secure Computations. Proceedings of the IEEE Symposium on Foundations of Computer Science, 1982.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
March 2012
2179 pages
ISBN:9781450308571
DOI:10.1145/2245276
  • Conference Chairs:
  • Sascha Ossowski,
  • Paola Lecca
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud computing
  2. database join
  3. outsourcing
  4. privacy
  5. set intersection

Qualifiers

  • Research-article

Conference

SAC 2012
Sponsor:
SAC 2012: ACM Symposium on Applied Computing
March 26 - 30, 2012
Trento, Italy

Acceptance Rates

SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)2
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media