USENIX Security '23: Breakthrough in Linear Private Set Union with Multi-Query Reverse Membership Test πŸ”’

Discover the latest advancements from USENIX Security '23 as Cong Zhang introduces a novel linear private set union method leveraging multi-query reverse private membership tests, enhancing privacy and efficiency in data collaboration.

USENIX Security '23: Breakthrough in Linear Private Set Union with Multi-Query Reverse Membership Test πŸ”’
USENIX
289 views β€’ Nov 30, 2023
USENIX Security '23: Breakthrough in Linear Private Set Union with Multi-Query Reverse Membership Test πŸ”’

About this video

USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test

Cong Zhang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Yu Chen, School of Cyber Science and Technology, Shandong University; State Key Laboratory of Cryptology; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University; Weiran Liu, Alibaba Group; Min Zhang, School of Cyber Science and Technology, Shandong University; State Key Laboratory of Cryptology; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University; Dongdai Lin, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences

Private set union (PSU) protocol enables two parties, each holding a set, to compute the union of their sets without revealing anything else to either party. So far, there are two known approaches for constructing PSU protocols. The first mainly depends on additively homomorphic encryption (AHE), which is generally inefficient since it needs to perform a non-constant number of homomorphic computations on each item. The second is mainly based on oblivious transfer and symmetric-key operations, which is recently proposed by Kolesnikov et al. (ASIACRYPT 2019). It features good practical performance, which is several orders of magnitude faster than the first one. However, neither of these two approaches is optimal in the sense that their computation and communication complexity are not both O(n), where n is the size of the set. Therefore, the problem of constructing the optimal PSU protocol remains open.

In this work, we resolve this open problem by proposing a generic framework of PSU from oblivious transfer and a newly introduced protocol called multi-query reverse private membership test (mq-RPMT). We present two generic constructions of mq-RPMT. The first is based on symmetric-key encryption and general 2PC techniques. The second is based on re-randomizable public-key encryption. Both constructions lead to PSU with linear computation and communication complexity.

We implement our two PSU protocols and compare them with the state-of-the-art PSU. Experiments show that our PKE-based protocol has the lowest communication of all schemes, which is 3.7-14.8Γ— lower depending on set size. The running time of our PSU scheme is 1.2-12Γ— faster than that of state-of-the-art depending on network environments.

View the full USENIX Security '23 program at https://www.usenix.org/conference/usenixsecurity23/program

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

289

Likes

2

Duration

11:47

Published

Nov 30, 2023

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.