Efficient protocols for privacy preserving matching against distributed datasets

Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

62 Citations (Scopus)

Abstract

When datasets are distributed on different sources, finding out matched data while preserving the privacy of the datasets is a widely required task. In this paper, we address two matching problems against the private datasets on N (N ≥ 2) parties. The first one is the Privacy Preserving Set Intersection (PPSI) problem, in which each party wants to learn the intersection of the N private datasets. The second one is the Privacy Preserving Set Matching (PPSM) problem, in which each party wants to learn whether its elements can be matched in any private set of the other parties. For the two problems we propose efficient protocols based on a threshold cryptosystem which is additive homomorphic. In a comparison with the related work in [18], the computation and communication costs of our PPSI protocol decrease by 81% and 17% respectively, and the computation and communication costs of our PPSM protocol decrease by 80% and 50% respectively. In practical utilities both of our protocols save computation time and communication bandwidth.

Original languageEnglish
Title of host publicationInformation and Communications Security - 8th International Conference, ICICS 2006, Proceedings
EditorsPeng Ning, Sihan Qing, Ninghui Li
PublisherSpringer Verlag
Pages210-227
Number of pages18
ISBN (Print)9783540494966
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event8th International Conference on Information and Communications Security, ICICS 2006 - Raleigh, United States
Duration: 4 Dec 20067 Dec 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4307 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Information and Communications Security, ICICS 2006
Country/TerritoryUnited States
CityRaleigh
Period4/12/067/12/06

Keywords

  • Cryptographic protocol
  • Distributed database
  • Privacy preservation
  • Set intersection
  • Set matching

Fingerprint

Dive into the research topics of 'Efficient protocols for privacy preserving matching against distributed datasets'. Together they form a unique fingerprint.

Cite this