Securely Computing Protocol of Set Intersection under the Malicious Model

ELECTRONICS(2023)

引用 0|浏览5
暂无评分
摘要
Private set intersection (PSI) is a valuable technique with various practical applications, including secure matching of communication packets in the Internet of Things. However, most of the currently available two-party PSI protocols are based on the oblivious transfer (OT) protocol, which is computationally expensive and results in significant communication overhead. In this paper, we propose a new coding method to design a two-party PSI protocol under the semi-honest model. We analyze possible malicious attacks and then develop a PSI protocol under the malicious model using the Paillier cryptosystem, cut-and-choose, zero-knowledge proof, and other cryptographic tools. By adopting the real/ideal model paradigm, we prove the protocol's security under the malicious model, which is more efficient compared to the existing related schemes.
更多
查看译文
关键词
secure multi-party computation,set intersection,malicious attacks,real/ideal model paradigm
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要