Mistakes of A Popular Protocol Calculating Private Set Intersection and Union Cardinality and Its Corrections

07/27/2022
by   Yang Tan, et al.
0

In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality(PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency(linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited(more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct result of the test data. Since the original paper lacks of experimental results to verify the protocol's correctness, we looked deeper into the protocol and found out it made a fundamental mistake. Needless to say, its correctness analysis and security proof are also wrong. In this paper, we will point out this PSI-CA protocol's mistakes, and provide the correct version of this protocol as well as the PSI protocol developed from this protocol. We also present a new security proof and some experimental results of the corrected protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/30/2023

Secure multiparty quantum computations for greatest common divisor and private set intersection

We present a secure multiparty quantum computation (MPQC) for computing ...
research
09/05/2022

Private Simultaneous Messages Based on Quadratic Residues

Private Simultaneous Messages (PSM) model is a minimal model for secure ...
research
06/06/2018

Another Proof of Cuckoo hashing with New Variants

We show a new proof for the load of obtained by a Cuckoo Hashing data st...
research
08/28/2023

Advancement on Security Applications of Private Intersection Sum Protocol

Secure computation protocols combine inputs from involved parties to gen...
research
09/28/2022

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection

In a Private section intersection (PSI) protocol, Alice and Bob compute ...
research
07/13/2021

An Improvement of a Key Exchange Protocol Relying on Polynomial Maps

Akiyama et al. (Int. J. Math. Indust., 2019) proposed a post-quantum key...
research
09/24/2018

Security and Performance Considerations in ROS 2: A Balancing Act

Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to supp...

Please sign up or login with your details

Forgot password? Click here to reset