Private Intersection of Certified Sets

12 years 1 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersection function without revealing their input sets. Since the inputs are private, malicious participants may choose their sets arbitrarily and may use this flexibility to affect the result or learn more about the input of an honest participant. With certified sets, a trusted party ensures the inputs are valid and binds them to each participant. The strength of the malicious model with certified inputs increases the applicability of private set intersection to real world problems. With respect to efficiency the new certified set intersection protocol improves existing malicious model private set intersection protocols by a constant factor.
Jan Camenisch, Gregory M. Zaverucha
Added 16 Aug 2010
Updated 16 Aug 2010
Type Conference
Year 2009
Where FC
Authors Jan Camenisch, Gregory M. Zaverucha
Comments (0)