The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Secure Computation of Private Set Intersection Cardinality With Linear Complexity
Abstract
PSI and its variants play a major role when the participants want to perform secret operations on their private data sets. The importance of this chapter is twofold. In the first phase, the author presents a size-hiding PSI-CA protocol followed by its authorized variant, APSI-CA, utilizing Bloom filter. All these constructions are proven to be secure in standard model with linear complexity. In the second phase, the author employs Bloom filter to design an efficient mPSI-CA protocol. It achieves fairness using offline semi-trusted third party (arbiter) unlike the most efficient existing protocols. The arbiter is semi-trusted in the sense that he does not have access to the private information of the entities while he will follow the protocol honestly. Proposed mPSI-CA is proven to be secure against malicious adversaries in the random oracle model (ROM) under the decisional Diffie-Hellman (DDH) assumption. It achieves linear complexity.
Related Content
Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda.
© 2024.
26 pages.
|
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha.
© 2024.
20 pages.
|
K. Sriprasadh.
© 2024.
24 pages.
|
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh.
© 2024.
20 pages.
|
R. Jayashree, J. Venkata Subramanian.
© 2024.
14 pages.
|
M. Indira, K. S. Mohanasundaram, M. Saranya.
© 2024.
14 pages.
|
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith.
© 2024.
26 pages.
|
|
|