International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Paper: Two-Sided Malicious Security for Private Intersection-Sum with Cardinality

Authors:
Peihan Miao , Visa Research
Sarvar Patel , Google LLC
Mariana Raykova , Google LLC
Karn Seth , Google LLC
Moti Yung , Google LLC
Download:
DOI: http://dx.doi.org/10.1007/978-3-030-56877-1_1 (login may be required)
Search ePrint
Search Google
Conference: CRYPTO 2020
Abstract: Private intersection-sum with cardinality allows two parties, where each party holds a private set and one of the parties additionally holds a private integer value associated with each element in her set, to jointly compute the cardinality of the intersection of the two sets as well as the sum of the associated integer values for all the elements in the intersection, and nothing beyond that. We present a new construction for private intersection sum with cardinality that provides malicious security with abort and guarantees that both parties receive the output upon successful completion of the protocol. A central building block for our constructions is a primitive called shuffled distributed oblivious PRF (DOPRF), which is a PRF that offers oblivious evaluation using a secret key shared between two parties, and in addition to this allows obliviously permuting the PRF outputs of several parallel oblivious evaluations. We present the first construction for shuffled DOPRF with malicious security. We further present several new sigma proof protocols for relations across Pedersen commitments, ElGamal encryptions, and Camenisch-Shoup encryptions that we use in our main construction, for which we develop new batching techniques to reduce communication. We implement and evaluate the efficiency of our protocol and show that we can achieve communication cost that is only 4-5x greater than the most efficient semi-honest protocol. When measuring monetary cost of executing the protocol in the cloud, our protocol is 25x more expensive than the semi-honest protocol. Our construction also allows for different parameter regimes that enable trade-offs between communication and computation.
Video from CRYPTO 2020
BibTeX
@inproceedings{crypto-2020-30402,
  title={Two-Sided Malicious Security for Private Intersection-Sum with Cardinality},
  publisher={Springer-Verlag},
  doi={http://dx.doi.org/10.1007/978-3-030-56877-1_1},
  author={Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung},
  year=2020
}