Loading…
Optimized verifiable delegated private set intersection on outsourced private datasets
Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues,...
Saved in:
Published in: | Computers & security 2024-06, Vol.141, p.103822, Article 103822 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63 |
container_end_page | |
container_issue | |
container_start_page | 103822 |
container_title | Computers & security |
container_volume | 141 |
creator | Jiang, Guangshang Zhang, Hanlin Lin, Jie Kong, Fanyu Yu, Leyun |
description | Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility. |
doi_str_mv | 10.1016/j.cose.2024.103822 |
format | article |
fullrecord | <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1016_j_cose_2024_103822</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404824001238</els_id><sourcerecordid>S0167404824001238</sourcerecordid><originalsourceid>FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63</originalsourceid><addsrcrecordid>eNp9UE1LxDAUDKLguvoHPPUPtCZp0ybgRRa_YGEv6jWkLy-SsrtdkmxBf70p68GT8OA9hpnHzBByy2jFKGvvhgrGiBWnvMlALTk_IwsmO162nMpzssikrmxoIy_JVYwDpaxrpVyQj80h-Z3_RltMGLzzpt9iYXGLnyZl8BD8lI8iYir8PmGICMmP-2KeY4rjMcAfmjXJZGq8JhfObCPe_O4leX96fFu9lOvN8-vqYV0CFyyVzjEQrgXZUMEcp0oZIbmysu-hq6WlNe-Bg2JWiLpjDVCpLFDFrQBUtq2XhJ_-QhhjDOh0drIz4Uszqudm9KDnZvTcjD41k0X3JxFmZ5PHoCN43OccPuR02o7-P_kPQI5ueA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Optimized verifiable delegated private set intersection on outsourced private datasets</title><source>ScienceDirect Freedom Collection</source><creator>Jiang, Guangshang ; Zhang, Hanlin ; Lin, Jie ; Kong, Fanyu ; Yu, Leyun</creator><creatorcontrib>Jiang, Guangshang ; Zhang, Hanlin ; Lin, Jie ; Kong, Fanyu ; Yu, Leyun</creatorcontrib><description>Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2024.103822</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Cloud computing ; Private set intersection ; Secret sharing ; Secure multiparty computation ; Verifiable computation</subject><ispartof>Computers & security, 2024-06, Vol.141, p.103822, Article 103822</ispartof><rights>2024 Elsevier Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63</cites><orcidid>0000-0001-8869-6863</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Jiang, Guangshang</creatorcontrib><creatorcontrib>Zhang, Hanlin</creatorcontrib><creatorcontrib>Lin, Jie</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Yu, Leyun</creatorcontrib><title>Optimized verifiable delegated private set intersection on outsourced private datasets</title><title>Computers & security</title><description>Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.</description><subject>Cloud computing</subject><subject>Private set intersection</subject><subject>Secret sharing</subject><subject>Secure multiparty computation</subject><subject>Verifiable computation</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9UE1LxDAUDKLguvoHPPUPtCZp0ybgRRa_YGEv6jWkLy-SsrtdkmxBf70p68GT8OA9hpnHzBByy2jFKGvvhgrGiBWnvMlALTk_IwsmO162nMpzssikrmxoIy_JVYwDpaxrpVyQj80h-Z3_RltMGLzzpt9iYXGLnyZl8BD8lI8iYir8PmGICMmP-2KeY4rjMcAfmjXJZGq8JhfObCPe_O4leX96fFu9lOvN8-vqYV0CFyyVzjEQrgXZUMEcp0oZIbmysu-hq6WlNe-Bg2JWiLpjDVCpLFDFrQBUtq2XhJ_-QhhjDOh0drIz4Uszqudm9KDnZvTcjD41k0X3JxFmZ5PHoCN43OccPuR02o7-P_kPQI5ueA</recordid><startdate>202406</startdate><enddate>202406</enddate><creator>Jiang, Guangshang</creator><creator>Zhang, Hanlin</creator><creator>Lin, Jie</creator><creator>Kong, Fanyu</creator><creator>Yu, Leyun</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-8869-6863</orcidid></search><sort><creationdate>202406</creationdate><title>Optimized verifiable delegated private set intersection on outsourced private datasets</title><author>Jiang, Guangshang ; Zhang, Hanlin ; Lin, Jie ; Kong, Fanyu ; Yu, Leyun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cloud computing</topic><topic>Private set intersection</topic><topic>Secret sharing</topic><topic>Secure multiparty computation</topic><topic>Verifiable computation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jiang, Guangshang</creatorcontrib><creatorcontrib>Zhang, Hanlin</creatorcontrib><creatorcontrib>Lin, Jie</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Yu, Leyun</creatorcontrib><collection>CrossRef</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jiang, Guangshang</au><au>Zhang, Hanlin</au><au>Lin, Jie</au><au>Kong, Fanyu</au><au>Yu, Leyun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimized verifiable delegated private set intersection on outsourced private datasets</atitle><jtitle>Computers & security</jtitle><date>2024-06</date><risdate>2024</risdate><volume>141</volume><spage>103822</spage><pages>103822-</pages><artnum>103822</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2024.103822</doi><orcidid>https://orcid.org/0000-0001-8869-6863</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2024-06, Vol.141, p.103822, Article 103822 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_crossref_primary_10_1016_j_cose_2024_103822 |
source | ScienceDirect Freedom Collection |
subjects | Cloud computing Private set intersection Secret sharing Secure multiparty computation Verifiable computation |
title | Optimized verifiable delegated private set intersection on outsourced private datasets |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T16%3A43%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimized%20verifiable%20delegated%20private%20set%20intersection%20on%20outsourced%20private%20datasets&rft.jtitle=Computers%20&%20security&rft.au=Jiang,%20Guangshang&rft.date=2024-06&rft.volume=141&rft.spage=103822&rft.pages=103822-&rft.artnum=103822&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2024.103822&rft_dat=%3Celsevier_cross%3ES0167404824001238%3C/elsevier_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |