2018
DOI: 10.1515/popets-2018-0037
|View full text |Cite
|
Sign up to set email alerts
|

PIR-PSI: Scaling Private Contact Discovery

Abstract: An important initialization step in many social-networking applications is contact discovery, which allows a user of the service to identify which of its existing social contacts also use the service. Naïve approaches to contact discovery reveal a user’s entire set of social/professional contacts to the service, presenting a significant tension between functionality and privacy. In this work, we present a system for private contact discovery, in which the client learns only the intersection of its own contact … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(23 citation statements)
references
References 25 publications
0
23
0
Order By: Relevance
“…Here we compare our HPIR design with state-of-the-art (homogenous) two-server PIR designs of PIR-PSI [19] and RAID-PIR [18], as well as the state-of-the-art single-server SealPIR [4], in terms of computation and communication costs. Note that not all PIR protocols can be converted into an HPIR format, so we compare with their regular (homogenous) versions.…”
Section: Comparison With State-of-the-art Pir Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…Here we compare our HPIR design with state-of-the-art (homogenous) two-server PIR designs of PIR-PSI [19] and RAID-PIR [18], as well as the state-of-the-art single-server SealPIR [4], in terms of computation and communication costs. Note that not all PIR protocols can be converted into an HPIR format, so we compare with their regular (homogenous) versions.…”
Section: Comparison With State-of-the-art Pir Protocolsmentioning
confidence: 99%
“…We download a 10.95MB file from a 2GB database. PIR-PSI [19] is based on the distributed point function (DPF) rather than secret sharing; therefore there is no trivial way to convert them into an HPIR setting.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…We assume that communicating clients already know each others' long-term public keys. Talek is compatible with bootstrapping keys from other applications [5,34] or identity-based encryption [16,17,62]. We assume each server has a public-private key pair, pk, sk, generated using an algorithm PKGen(), and that all server public keys are known to all users.…”
Section: Assumptionsmentioning
confidence: 99%
“…Demmler et al [14] use a PIR based on distributed point functions (DPF) to construct a multi-server private setintersection protocol optimized for unbalanced set sizes. In addition to a performant implementation, they also touch on deployment considerations, which we also discuss in Section V-D.…”
Section: Related Workmentioning
confidence: 99%