2023
DOI: 10.3390/math11081784
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption

Abstract: With the development of cloud computing and big data, secure multi-party computation, which can collaborate with multiple parties to deal with a large number of transactions, plays an important role in protecting privacy. Private set intersection (PSI), a form of multi-party secure computation, is a formidable cryptographic technique that allows the sender and the receiver to calculate their intersection and not reveal any more information. As the data volume increases and more application scenarios emerge, PS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 49 publications
(65 reference statements)
0
1
0
Order By: Relevance
“…We set the amount of data for the client and server to 2 8 and increased the number of participants from 2 4 to 2 9 for these experiments, which aimed at testing the runtime of individual clients and the server. The experimental results are shown in Table 3 and Figure 2.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We set the amount of data for the client and server to 2 8 and increased the number of participants from 2 4 to 2 9 for these experiments, which aimed at testing the runtime of individual clients and the server. The experimental results are shown in Table 3 and Figure 2.…”
Section: Methodsmentioning
confidence: 99%
“…The server and client dataset size was fixed at 2 8 . The number of participants gradually increased from 2 4 to 2 9 .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…With the advent of cloud computing, PSI protocols relying on a third party have been introduced in the literature [26,27]. In these protocols, participants encode their private data through a random function and send the encoded values to a third party, who computes the intersection and returns it to each party.…”
Section: Related Workmentioning
confidence: 99%
“…MPSI denotes the privacy set intersection protocol involving a multitude of participating entities, exceeding the count of two. Presently, MPSI protocols are predominantly realized through techniques such as oblivious transfer [5] , homomorphic encryption [6] , oblivious polynomial computation [7] and quantum cryptography [8] . While these techniques ensure privacy guarantees within a public-key cryptography framework, they entail substantial computational overhead.…”
Section: Introductionmentioning
confidence: 99%