Enabling threshold functionality for private set intersection protocols in cloud computing
Multi-party computation (MPC) allows parties to interact with cloud-based data and services while maintaining privacy and confidentiality of their private data. As a special case of MPC, private set intersection (PSI) protocols focus on securely computing the intersection between a server and a clie...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/178716 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-178716 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1787162024-07-08T15:34:45Z Enabling threshold functionality for private set intersection protocols in cloud computing Hu, Jingwei Zhao, Yongjun Tan, Benjamin Hong Meng Aung, Khin Mi Mi Wang, Huaxiong School of Physical and Mathematical Sciences Digital Trust Centre Computer and Information Science Cryptography Private set intersection Multi-party computation (MPC) allows parties to interact with cloud-based data and services while maintaining privacy and confidentiality of their private data. As a special case of MPC, private set intersection (PSI) protocols focus on securely computing the intersection between a server and a client of their private set. Our research extends the threshold functionality for PSI within the realm of cloud computing, where the server possesses a larger set than the client. This paper fills this gap by proposing new private intersection cardinality (PSI-CA) protocol, and more broadly, threshold private set intersection (tPSI) protocol using fully homomorphic encryption (FHE). In tPSI protocol, two parties holding two private sets collaboratively compute the intersection and reveal the result if and only if the size of the intersection exceeds some predefined threshold. In this process, no other information, in particular, elements not in the intersection remain hidden. The problem of PSI-CA and tPSI has many applications in online collaboration, <italic>e.g</italic>., fingerprint matching, online dating, and ride sharing. At a high level, we use FHE to encrypt a Bloom filter (BF) that encodes the small set and homomorphically check whether the elements in the larger set belongs to the small set, <italic>e.g</italic>., homomorphic membership test. Counting the number of positive membership directly already yields a PSI-CA protocol with optimal asymptotic communication complexity Ω(<italic>n</italic>) = Ω(min(<italic>N</italic>, <italic>n</italic>)), where <italic>N</italic> (resp. <italic>n</italic>) is the size of the large (resp. small) set. To construct a tPSI protocol, we develop a novel secret token generation protocol: a shared secret token is generated if and only if the intersection size satisfies the threshold condition, by exploiting the programmable bootstrapping technique in FHE. This new secret token generation protocol, when composed with any standard PSI protocol, yields a tPSI with the same asymptotic communication complexity as the chosen plain PSI. Along the way, we develop specific FHE optimizations that might be of independent interest. These optimizations overcome the weakness of low precision in programmable bootstrapping. As a result, tPSI over relatively large sets can be supported. Agency for Science, Technology and Research (A*STAR) Info-communications Media Development Authority (IMDA) National Research Foundation (NRF) Submitted/Accepted version This work was supported in part by the National Research Foundation, Singapore; and in part by the Infocomm Media Development Authority under its Trust Tech Funding Initiative. The work of Jingwei Hu, Benjamin Hong Meng Tan, Khin Mi Mi Aung, and Huaxiong Wang was supported by the Agency for Science, Technology and Research (A*STAR) under its RIE2020 Advanced Manufacturing and Engineering (AME) Programmatic Program under Award A19E3b0099. 2024-07-03T07:24:53Z 2024-07-03T07:24:53Z 2024 Journal Article Hu, J., Zhao, Y., Tan, B. H. M., Aung, K. M. M. & Wang, H. (2024). Enabling threshold functionality for private set intersection protocols in cloud computing. IEEE Transactions On Information Forensics and Security, 19, 6184-6196. https://dx.doi.org/10.1109/TIFS.2024.3402355 1556-6013 https://hdl.handle.net/10356/178716 10.1109/TIFS.2024.3402355 2-s2.0-85193463305 19 6184 6196 en A19E3b0099 IEEE Transactions on Information Forensics and Security © 2024 IEEE. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1109/TIFS.2024.3402355. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computer and Information Science Cryptography Private set intersection |
spellingShingle |
Computer and Information Science Cryptography Private set intersection Hu, Jingwei Zhao, Yongjun Tan, Benjamin Hong Meng Aung, Khin Mi Mi Wang, Huaxiong Enabling threshold functionality for private set intersection protocols in cloud computing |
description |
Multi-party computation (MPC) allows parties to interact with cloud-based data and services while maintaining privacy and confidentiality of their private data. As a special case of MPC, private set intersection (PSI) protocols focus on securely computing the intersection between a server and a client of their private set. Our research extends the threshold functionality for PSI within the realm of cloud computing, where the server possesses a larger set than the client. This paper fills this gap by proposing new private intersection cardinality (PSI-CA) protocol, and more broadly, threshold private set intersection (tPSI) protocol using fully homomorphic encryption (FHE). In tPSI protocol, two parties holding two private sets collaboratively compute the intersection and reveal the result if and only if the size of the intersection exceeds some predefined threshold. In this process, no other information, in particular, elements not in the intersection remain hidden. The problem of PSI-CA and tPSI has many applications in online collaboration, <italic>e.g</italic>., fingerprint matching, online dating, and ride sharing. At a high level, we use FHE to encrypt a Bloom filter (BF) that encodes the small set and homomorphically check whether the elements in the larger set belongs to the small set, <italic>e.g</italic>., homomorphic membership test. Counting the number of positive membership directly already yields a PSI-CA protocol with optimal asymptotic communication complexity Ω(<italic>n</italic>) = Ω(min(<italic>N</italic>, <italic>n</italic>)), where <italic>N</italic> (resp. <italic>n</italic>) is the size of the large (resp. small) set. To construct a tPSI protocol, we develop a novel secret token generation protocol: a shared secret token is generated if and only if the intersection size satisfies the threshold condition, by exploiting the programmable bootstrapping technique in FHE. This new secret token generation protocol, when composed with any standard PSI protocol, yields a tPSI with the same asymptotic communication complexity as the chosen plain PSI. Along the way, we develop specific FHE optimizations that might be of independent interest. These optimizations overcome the weakness of low precision in programmable bootstrapping. As a result, tPSI over relatively large sets can be supported. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Hu, Jingwei Zhao, Yongjun Tan, Benjamin Hong Meng Aung, Khin Mi Mi Wang, Huaxiong |
format |
Article |
author |
Hu, Jingwei Zhao, Yongjun Tan, Benjamin Hong Meng Aung, Khin Mi Mi Wang, Huaxiong |
author_sort |
Hu, Jingwei |
title |
Enabling threshold functionality for private set intersection protocols in cloud computing |
title_short |
Enabling threshold functionality for private set intersection protocols in cloud computing |
title_full |
Enabling threshold functionality for private set intersection protocols in cloud computing |
title_fullStr |
Enabling threshold functionality for private set intersection protocols in cloud computing |
title_full_unstemmed |
Enabling threshold functionality for private set intersection protocols in cloud computing |
title_sort |
enabling threshold functionality for private set intersection protocols in cloud computing |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/178716 |
_version_ |
1806059871218434048 |