International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Paper: (If) Size Matters: Size-Hiding Private Set Intersection

Authors:
Giuseppe Ateniese
Emiliano De Cristofaro
Gene Tsudik
Download:
URL: http://eprint.iacr.org/2010/220
Search ePrint
Search Google
Abstract: Modern society is increasingly dependent on, and fearful of, the availability of electronic information. There are numerous examples of situations where sensitive data must be – sometimes reluctantly – shared between two or more entities without mutual trust. As often happens, the research community has foreseen the need for mechanisms to enable limited (privacy-preserving) sharing of sensitive information and a number of effective (if not always efficient) solutions have been proposed. Among them, Private Set Intersection techniques are particularly appealing for scenarios where two parties wish to compute an intersection of their respective sets of items without revealing to each other any other information. Thus far, ”any other information” has been interpreted to mean any information about items not in the intersection. In this paper, we motivate the need for Private Set Intersection with stronger privacy properties that include hiding of the set size held by one of the two entities (Client). This new and important privacy feature turns out to be attainable at relative low additional cost. We illustrate a pair of concrete SHI-PSI (Size-Hiding Private Set Intersection) protocols that offer a trade-off between stronger privacy and better efficiency. Both protocols are provably secure under very standard cryptographic assumptions. We demonstrate their practicality via experimental results obtained from a prototype implementation. We also consider size-hiding in a group PSI setting and construct a Group SHI-PSI extension that incurs surprisingly low overhead.
BibTeX
@misc{eprint-2010-23121,
  title={(If) Size Matters: Size-Hiding Private Set Intersection},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols /},
  url={http://eprint.iacr.org/2010/220},
  note={ edecrist@uci.edu 14802 received 19 Apr 2010, last revised 12 Jul 2010},
  author={Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik},
  year=2010
}