The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.3934/amc.2020071
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient multiparty private set intersection cardinality

Abstract: In the field of privacy preserving protocols, Private Set Intersection (PSI) plays an important role. In most of the cases, PSI allows two parties to securely determine the intersection of their private input sets, and no other information. In this paper, employing a Bloom filter, we propose a Multiparty Private Set Intersection Cardinality (MPSI-CA), where the number of participants in PSI is not limited to two. The security of our scheme is achieved in the standard model under the Decisional Diffie-Hellman (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…What's more, we focus on its applications. The further results show that quantum Bloom filter is a nearly perfect tool to solve the privacy-preserving issues with private sets, e.g., Oblivious Set-member Decision [12] and Multiparty Private Set Intersection Cardinality [13].…”
Section: Introductionmentioning
confidence: 91%
See 3 more Smart Citations
“…What's more, we focus on its applications. The further results show that quantum Bloom filter is a nearly perfect tool to solve the privacy-preserving issues with private sets, e.g., Oblivious Set-member Decision [12] and Multiparty Private Set Intersection Cardinality [13].…”
Section: Introductionmentioning
confidence: 91%
“…In classical settings, a Bloom filter is a space-efficient probabilistic data structure [14], firstly presented by B. H. Bloom in 1970 [15], which is utilized to decide whether an element belongs to a set. It uses a bit array of size to represent a set of elements and employs independent collision-resistant hash functions {ℎ 1 , ℎ 2 , … , ℎ } to add elements into the bit array [13], where ℎ : {0,1} * → {1,2, … , } for = 1,2, … , .…”
Section: Bloom Filtermentioning
confidence: 99%
See 2 more Smart Citations
“…In the initialization stage, the encrypted label will be broadcasted to all participating parties, and ID alignment will be performed. Specifically, Diffie-Hellman algorithm (Li, 2010) will be used to perform private set intersection (Debnath et al, 2021) (PSI) and fulfill the ID alignment task. During the training process, Alg.…”
Section: Training Protocolmentioning
confidence: 99%