Premium
P‐8.8: Low cost private set intersection protocol based on oblivious transmission
Author(s) -
Luo Ran,
Han Haoting,
Yan Zian
Publication year - 2021
Publication title -
sid symposium digest of technical papers
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.351
H-Index - 44
eISSN - 2168-0159
pISSN - 0097-966X
DOI - 10.1002/sdtp.15326
Subject(s) - computer science , protocol (science) , communication source , bloom filter , hash function , computer network , set (abstract data type) , intersection (aeronautics) , encryption , transmission (telecommunications) , theoretical computer science , computer security , medicine , alternative medicine , aerospace engineering , telecommunications , pathology , engineering , programming language
Private set intersection (PSI) all two parties need to calculate the intersection of the sender and the receiver, and do not need to communicate with each other. At present this protocol is widely used in the field of information security. and PSI based on different technologies has been proposed. However, it is difficult for existing psi protocols to determine the best solution in each scenario. especially because they are not compared in the same environment. In addition, the existing psi protocols are several orders of magnitude slower than the hash method in practice,. This article reviews the development process of PSI, and then we focus on the security of semi honest adversary psi protocol and use the latest methods to improve efficiency to achieve inadvertent transmission. In addition. the important optimization of the previous psi protocol is proposed and a new psi protocol is proposed, Whose runtime is better than the existing protocol. In addition, by applying bloom filter. the receiver can calculate the output more easily than performing encryption on the senders private data set when using low‐power mobile. Internet of animals devices. In the semi honest model, we can prove the security of this method. In the experiment. through the implementation of all protocols on the same platform we give the use of this protocol in a specific environment, and evaluate the progress of PSI protocol by comparison. At present we use the insecure Nave hash protocol. By processing two large data sets. We prove the feasibility of our new psi protocol.