Unconditionally secure disjointness tests for private datasets (Q1017546)

From MaRDI portal
!
WARNING

This is the item page for this Wikibase entity, intended for internal use and editing purposes.

scientific article; zbMATH DE number 5552657
Language Label Description Also known as
default for all languages
No label defined
    English
    Unconditionally secure disjointness tests for private datasets
    scientific article; zbMATH DE number 5552657

      Statements

      Unconditionally secure disjointness tests for private datasets (English)
      0 references
      0 references
      0 references
      0 references
      0 references
      12 May 2009
      0 references
      Summary: We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require \(O(1)\) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
      0 references
      private matching
      0 references
      private set disjointness
      0 references
      secret sharing
      0 references
      secure multiparty computation
      0 references
      information theoretic security
      0 references
      cryptography
      0 references
      unconditional secure protocols
      0 references
      honest-but-curious
      0 references
      malicious adversaries
      0 references

      Identifiers