Optimal Communication Unbalanced Private Set Union

Jean-Guillaume Dumas,Alexis Galan,Bruno Grenet,Aude Maignan,Daniel S. Roche
2024-10-03
Abstract:We present new two-party protocols for the Unbalanced Private Set Union (UPSU) <a class="link-external link-http" href="http://problem.Here" rel="external noopener nofollow">this http URL</a>, the Sender holds a set of data points, and the Receiver holds another (possibly much larger) set, and they would like for the Receiver to learn the union of the two sets and nothing else. Furthermore, the Sender's computational cost, along with the communication complexity, should be smaller when the Sender has a smaller <a class="link-external link-http" href="http://set.While" rel="external noopener nofollow">this http URL</a> the UPSU problem has numerous applications and has seen considerable recent attention in the literature, our protocols are the first where the Sender's computational cost and communication volume are linear in the size of the Sender's set only, and do not depend on the size of the Receiver's <a class="link-external link-http" href="http://set.Our" rel="external noopener nofollow">this http URL</a> constructions combine linearly homomorphic encryption (LHE) withfully homomorphic encryption (FHE). The first construction uses multi-point polynomial evaluation (MEv) on FHE, and achieves optimal linear cost for the Sender, but has higher quadratic computational cost for the Receiver. In the second construction we explore another trade-off: the Receiver computes fast polynomial Euclidean remainder in FHE while the Sender computes a fast MEv, in LHE only. This reduces the Receiver's cost to quasi-linear, with a modest increase in the computational cost for the <a class="link-external link-http" href="http://Sender.Preliminary" rel="external noopener nofollow">this http URL</a> experimental results using HElib indicate that, for example, a Sender holding 1000 elements can complete our first protocol using less than 2s of computation time and less than 10MB of communication volume, independently of the Receiver's set size.
Cryptography and Security,Symbolic Computation
What problem does this paper attempt to address?