Super-threshold multi-party privacy set intersection method based on oblivious pseudo-random secret sharing

A technology of secret sharing and multi-party privacy, applied in the field of intersection of multi-party privacy sets beyond the threshold, it can solve problems such as inability to complete efficiently, and achieve the effect of optimal computing efficiency

Pending Publication Date: 2022-08-05
SHANGHAI OCEAN UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) The existing OT-MP-PSI protocol is based on the public key encryption security framework key, and its calculation process is calculated on the public key index and grows exponentially
[0008] (2) The OT-MP-PSI problem requires t participants to have the element to restore the element value, and the existing cryptography components cannot efficiently complete this function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Super-threshold multi-party privacy set intersection method based on oblivious pseudo-random secret sharing
  • Super-threshold multi-party privacy set intersection method based on oblivious pseudo-random secret sharing
  • Super-threshold multi-party privacy set intersection method based on oblivious pseudo-random secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] like figure 1 , 3 As shown in the figure, a method for intersection of super-threshold multi-party privacy sets based on inadvertent pseudo-random secret sharing, based on OPPRF components and SS components, design inadvertently programmable pseudo-random secret sharing (OPPR-SS) protocol, the protocol structure is as follows:

[0050] Parameters: sender S, owns set Y: {y 1 ,...,y n }. The receiver R, owns the element x. OPRF function, OKVS function: F k ( ), j∈[1,n]

[0051] Input: The receiver inputs element x.

[0052] Inadvertently programmable pseudo-random secret sharing protocol, abbreviated as OPPR-SS protocol in English.

[0053] Design an inadvertently programmable pseudorandom secret sharing (OPPR-SS) protocol, including the following stages:

[0054] S1.OPRF stage:

[0055] The receiver R and the sender S execute an OPRF function:

[0056] S11. The receiver outputs the OPRF value: F k (x);

[0057] S12. The sender outputs the OPRF function key: k...

Embodiment 2

[0074] like figure 2 , 3 As shown, the OT-MP-PSI protocol can be easily constructed through the OPPR-SS component, and this embodiment can be implemented by simply constructing the technology of the present invention. The OT-MP-PSI protocol provided by this embodiment can be divided into two stages :

[0075] (1) Shared generation stage: Participants execute the OPPR-SS protocol in pairs: Suppose P i (i∈m) is the sender, P j (j∈m) is the receiver. sender P i Randomly generate t-1 random numbers for each element in its set, which are used to construct a polynomial P with a constant term of t order 0 to achieve element-wise secret shared value generation for all participants. Participant P j input collection element Participant P i Enter OKVS (k∈n,k i,j for the participant P i with P j key selected when implementing the OPPR-SS protocol). Participant P j output where m is the number of participants and n is the set size.

[0076] (2) Reconstruction stage: Par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a super-threshold multi-party privacy set intersection method based on oblivious pseudo-random secret sharing, which is characterized in that an oblivious programmable pseudo-random secret sharing (OPPR-SS) protocol is designed based on an OPPRF component and an SS component, and the protocol has the following structure: parameters: a sender S having a set Y: {y1,..., yn}; and the receiver R has the element x. An OPRF function and an OKVS function: Fk (.), j belongs to [1, n]; and inputting: inputting an element x by a receiver. The oblivious programmable pseudo-random secret sharing protocol is abbreviated as an OPPR-SS protocol in English. According to the method, construction can be carried out on constants only by using symmetric keys and secret sharing, and the method has better calculation efficiency under the condition that the communication round number and the communication complexity are consistent. The OPPR-SS component constructed by the invention can be used as an independent new cryptographic component, and can complete specific input with a security attribute to generate specific output with a (t, n) reconstruction attribute.

Description

technical field [0001] The invention belongs to the field of privacy computing security in the field of big data security, and in particular relates to a method for finding intersection of multi-party privacy sets with super-threshold values ​​based on inadvertent pseudo-random secret sharing. Background technique [0002] With the advent of the Internet era of big data, the generation and storage of data are distributed. In the process of mining the potential value of data, problems such as data privacy leakage are often caused. Therefore, it is urgent to realize the availability of data and to solve the problems of data security and privacy protection. Private Set Intersection (PSI) is an important mining technology to realize data privacy protection. It allows participants to input private sets and jointly calculate the set intersection without revealing other information other than the intersection. [0003] Two-party PSI protocol is a widely studied privacy computing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/30
CPCH04L9/0656H04L9/085H04L9/06H04L9/30
Inventor 魏立斐张蕾刘纪海王勤
Owner SHANGHAI OCEAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products