DP-PSI: Private and Secure Set Intersection

08/28/2022
by   Jian Du, et al.
0

One way to classify private set intersection (PSI) for secure 2-party computation is whether the intersection is (a) revealed to both parties or (b) hidden from both parties while only the computing function of the matched payload is exposed. Both aim to provide cryptographic security while avoiding exposing the unmatched elements of the other. They may, however, be insufficient to achieve security and privacy in one practical scenario: when the intersection is required and the information leaked through the function's output must be considered for legal, ethical, and competitive reasons. Two parties, such as the advertiser and the ads supplier, hold sets of users for PSI computation, for example, to reveal common users to the ads supplier in joint marketing applications. In addition to the security guarantees required by standard PSIs to secure unmatched elements, neither party is allowed to "single out" whether an element/user belongs to the other party or not, even though common users are required for joint advertising. This is a fascinating problem for which none of the PSI techniques have provided a solution. In light of this shortcoming, we compose differential privacy (DP) and S2PC to provide the best of both worlds and propose differentially-private PSI (DP-PSI), a new privacy model that shares PSI's strong security protection while adhering to the GDPR's recent formalization of the notion of excluding "signaling out" attacks by each party except with very low probability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/07/2023

Private Membership Aggregation

We consider the problem of private membership aggregation (PMA), in whic...
research
06/30/2022

Accountable Private Set Cardinality for Distributed Measurement

We introduce cryptographic protocols for securely and efficiently comput...
research
10/03/2019

On the security and privacy of Interac e-Transfers

Nowadays, the Interac e-Transfer is one of the most important remote pay...
research
10/14/2022

Reflections on trusting distributed trust

Many systems today distribute trust across multiple parties such that th...
research
11/13/2022

Comprehension from Chaos: What Users Understand and Expect from Private Computation

Private computation, which includes techniques like multi-party computat...
research
10/23/2018

SATE: Robust and Private Allegation Escrows

For fear of retribution, the victim of a crime may be willing to report ...
research
10/04/2022

Privacy-Preserving Link Prediction

Consider two data holders, ABC and XYZ, with graph data (e.g., social ne...

Please sign up or login with your details

Forgot password? Click here to reset