Loading…

Optimized verifiable delegated private set intersection on outsourced private datasets

Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues,...

Full description

Saved in:
Bibliographic Details
Published in:Computers & security 2024-06, Vol.141, p.103822, Article 103822
Main Authors: Jiang, Guangshang, Zhang, Hanlin, Lin, Jie, Kong, Fanyu, Yu, Leyun
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63
container_end_page
container_issue
container_start_page 103822
container_title Computers & security
container_volume 141
creator Jiang, Guangshang
Zhang, Hanlin
Lin, Jie
Kong, Fanyu
Yu, Leyun
description Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.
doi_str_mv 10.1016/j.cose.2024.103822
format article
fullrecord <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1016_j_cose_2024_103822</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404824001238</els_id><sourcerecordid>S0167404824001238</sourcerecordid><originalsourceid>FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63</originalsourceid><addsrcrecordid>eNp9UE1LxDAUDKLguvoHPPUPtCZp0ybgRRa_YGEv6jWkLy-SsrtdkmxBf70p68GT8OA9hpnHzBByy2jFKGvvhgrGiBWnvMlALTk_IwsmO162nMpzssikrmxoIy_JVYwDpaxrpVyQj80h-Z3_RltMGLzzpt9iYXGLnyZl8BD8lI8iYir8PmGICMmP-2KeY4rjMcAfmjXJZGq8JhfObCPe_O4leX96fFu9lOvN8-vqYV0CFyyVzjEQrgXZUMEcp0oZIbmysu-hq6WlNe-Bg2JWiLpjDVCpLFDFrQBUtq2XhJ_-QhhjDOh0drIz4Uszqudm9KDnZvTcjD41k0X3JxFmZ5PHoCN43OccPuR02o7-P_kPQI5ueA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Optimized verifiable delegated private set intersection on outsourced private datasets</title><source>ScienceDirect Freedom Collection</source><creator>Jiang, Guangshang ; Zhang, Hanlin ; Lin, Jie ; Kong, Fanyu ; Yu, Leyun</creator><creatorcontrib>Jiang, Guangshang ; Zhang, Hanlin ; Lin, Jie ; Kong, Fanyu ; Yu, Leyun</creatorcontrib><description>Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2024.103822</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Cloud computing ; Private set intersection ; Secret sharing ; Secure multiparty computation ; Verifiable computation</subject><ispartof>Computers &amp; security, 2024-06, Vol.141, p.103822, Article 103822</ispartof><rights>2024 Elsevier Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63</cites><orcidid>0000-0001-8869-6863</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Jiang, Guangshang</creatorcontrib><creatorcontrib>Zhang, Hanlin</creatorcontrib><creatorcontrib>Lin, Jie</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Yu, Leyun</creatorcontrib><title>Optimized verifiable delegated private set intersection on outsourced private datasets</title><title>Computers &amp; security</title><description>Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.</description><subject>Cloud computing</subject><subject>Private set intersection</subject><subject>Secret sharing</subject><subject>Secure multiparty computation</subject><subject>Verifiable computation</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9UE1LxDAUDKLguvoHPPUPtCZp0ybgRRa_YGEv6jWkLy-SsrtdkmxBf70p68GT8OA9hpnHzBByy2jFKGvvhgrGiBWnvMlALTk_IwsmO162nMpzssikrmxoIy_JVYwDpaxrpVyQj80h-Z3_RltMGLzzpt9iYXGLnyZl8BD8lI8iYir8PmGICMmP-2KeY4rjMcAfmjXJZGq8JhfObCPe_O4leX96fFu9lOvN8-vqYV0CFyyVzjEQrgXZUMEcp0oZIbmysu-hq6WlNe-Bg2JWiLpjDVCpLFDFrQBUtq2XhJ_-QhhjDOh0drIz4Uszqudm9KDnZvTcjD41k0X3JxFmZ5PHoCN43OccPuR02o7-P_kPQI5ueA</recordid><startdate>202406</startdate><enddate>202406</enddate><creator>Jiang, Guangshang</creator><creator>Zhang, Hanlin</creator><creator>Lin, Jie</creator><creator>Kong, Fanyu</creator><creator>Yu, Leyun</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-8869-6863</orcidid></search><sort><creationdate>202406</creationdate><title>Optimized verifiable delegated private set intersection on outsourced private datasets</title><author>Jiang, Guangshang ; Zhang, Hanlin ; Lin, Jie ; Kong, Fanyu ; Yu, Leyun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cloud computing</topic><topic>Private set intersection</topic><topic>Secret sharing</topic><topic>Secure multiparty computation</topic><topic>Verifiable computation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jiang, Guangshang</creatorcontrib><creatorcontrib>Zhang, Hanlin</creatorcontrib><creatorcontrib>Lin, Jie</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Yu, Leyun</creatorcontrib><collection>CrossRef</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jiang, Guangshang</au><au>Zhang, Hanlin</au><au>Lin, Jie</au><au>Kong, Fanyu</au><au>Yu, Leyun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimized verifiable delegated private set intersection on outsourced private datasets</atitle><jtitle>Computers &amp; security</jtitle><date>2024-06</date><risdate>2024</risdate><volume>141</volume><spage>103822</spage><pages>103822-</pages><artnum>103822</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Private Set Intersection (PSI) has been applied in various fields, such as human genome research, advertising conversion rate analysis, etc. Traditional PSI has the drawback of requiring local devices to be constantly online and needing high storage capacity of the devices. To overcome these issues, many researchers have focused on delegating PSI computation to cloud servers. However, third-party clouds may bring many new challenges. One of the primary concerns is ensuring that the cloud server does not obtain sensitive data when the client outsources their dataset. Additionally, ensuring clients verify the correctness of the results is also a critical issue. In this paper, we propose the optimized verifiable delegated private set intersection protocol on outsourced private datasets (VO-PSI). Our protocol enables clients to verify the correctness of intersection with a negligible probability of incorrect results while being able to guarantee data privacy. Compared with previous research, the verifiability of the protocol has been dramatically improved. We analyze the security of the protocol under the malicious model and conduct experiments to evaluate its efficiency and feasibility.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2024.103822</doi><orcidid>https://orcid.org/0000-0001-8869-6863</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2024-06, Vol.141, p.103822, Article 103822
issn 0167-4048
1872-6208
language eng
recordid cdi_crossref_primary_10_1016_j_cose_2024_103822
source ScienceDirect Freedom Collection
subjects Cloud computing
Private set intersection
Secret sharing
Secure multiparty computation
Verifiable computation
title Optimized verifiable delegated private set intersection on outsourced private datasets
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T16%3A43%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimized%20verifiable%20delegated%20private%20set%20intersection%20on%20outsourced%20private%20datasets&rft.jtitle=Computers%20&%20security&rft.au=Jiang,%20Guangshang&rft.date=2024-06&rft.volume=141&rft.spage=103822&rft.pages=103822-&rft.artnum=103822&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2024.103822&rft_dat=%3Celsevier_cross%3ES0167404824001238%3C/elsevier_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c251t-ff1c5f6c84051f2099a5829d8bbc738d032bc2c91d553714c089dc092d5ce9d63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true