Earn While You Reveal: Private Set Intersection that Rewards Participants

01/10/2023
by   Aydin Abadi, et al.
0

In Private Set Intersection protocols (PSIs), a non-empty result always reveals something about the private input sets of the parties. Moreover, in various variants of PSI, not all parties necessarily receive or are interested in the result. Nevertheless, to date, the literature has assumed that those parties who do not receive or are not interested in the result still contribute their private input sets to the PSI for free, although doing so would cost them their privacy. In this work, for the first time, we propose a multi-party PSI, called "Anesidora", that rewards parties who contribute their private input sets to the protocol. Anesidora is efficient; it mainly relies on symmetric key primitives and its computation and communication complexities are linear with the number of parties and set cardinality. It remains secure even if the majority of parties are corrupted by active colluding adversaries.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/15/2021

Multi-party Private Set Operations with an External Decider

A Private Set Operation (PSO) protocol involves at least two parties wit...
research
08/17/2020

Multi-Party Private Set Intersection: An Information-Theoretic Approach

We investigate the problem of multi-party private set intersection (MP-P...
research
06/30/2022

Accountable Private Set Cardinality for Distributed Measurement

We introduce cryptographic protocols for securely and efficiently comput...
research
08/28/2023

Advancement on Security Applications of Private Intersection Sum Protocol

Secure computation protocols combine inputs from involved parties to gen...
research
04/08/2020

Improved Secure Efficient Delegated Private Set Intersection

Private Set Intersection (PSI) is a vital cryptographic technique used f...
research
09/07/2023

Private Membership Aggregation

We consider the problem of private membership aggregation (PMA), in whic...
research
05/03/2021

Characterization of Secure Multiparty Computation Without Broadcast

A major challenge in the study of cryptography is characterizing the nec...

Please sign up or login with your details

Forgot password? Click here to reset