Efficient Secure Set Intersection Problem Computation
Su-Fang ZHOU,Shun-Dong LI,Yi-Min GUO,Jia-Wei DOU,Zhen-Hua CHEN
DOI: https://doi.org/10.11897/SP.J.1016.2018.00464
2018-01-01
Chinese Journal of Computers
Abstract:Secure multi-party computation,which is a key technology of the information security in the cyberspace,is an important field of research in cryptography,and it is a research focus in the international cryptographic community in recent years.Scientific computation is a branch of secure multiparty computation.Set theory is the most important base of modern mathematics,and many mathematical branches are based on set theory.Since many problems can be abstracted as set problems,set theory and its mathematical thought are applied in more and more fields.The secure set computation is a highly important problem in the secure multiparty computation.Secure set intersection computation is an important problem within the secure set computation and attracts many attentions.The secure set intersection computation has many applications in the privacy preservation,such as the secure data mining,secure data outsourcing,analysis of the sensitive medical data,and secret sharing of the personal property data and other private data,etc.At present,the research of the secure set intersection computation has two aspects.On one hand,researchers research on the protocols that there are two parties,and their sets are taken from an infinite set.Even though most of researches focus on this circumstance,the solution for this circumstance is only computationally secure and not so efficient in term of computational complexity.On the other hand,the research for the secure multi-party set computation is quite few,and they are not efficient either.This paper designs different solutions for the different situations where the researchers have not well solved.In the multi-party set intersection computation,based on the polynomial representation of a finite set,this study first constructs a secure multi-party set intersection protocol which is not based on any primitives of cryptography,and it is information theoretically secure and has a low overhead of the computation and the communication.Based on this multi party protocol,we offer another protocol that has less computational complexity,while it sacrifices a little communication complexity.In the next,for the two-party set intersection computation and the sets of these two parties are taken from an infinite set,this manuscript presents an efficient protocol based on the one-way property of the one-way hash function.In addition,for the situation that the sets of two parties are subsets of a finite set,this work introduces an efficient protocol based on the assumption of the hardness of computing discrete logarithm.At the same time,the protocol we present for the two-party set intersection computation can be used to either the secure computation of the cardinality of the set intersection or the set union,and the authenticating of the secure set computation with a little changes.Finally,as an application of the first protocol,we demonstrate how to use the protocol to privately compute the greatest common divisor of several private numbers.The protocols that we present in this paper are proven to be secure in the semi-honest model using the simulation paradigm which is widely used in secure multiparty computation.