Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools

ACSC

2008

IEEE

2008

IEEE

We propose a more eﬃcient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication complexities (N is the number of parties in the protocol). Our protocol is obtained in the malicious model, in which we assume a probabilistic polynomial-time bounded adversary actively controls a ﬁxed set of t (t < N/2) parties. We use a (t + 1, N)-threshold version of the Boneh-Goh-Nissim (BGN) cryptosystem whose underlying group supports bilinear maps. The BGN cryptosystem is generally used in applications where the plaintext space should be small, because there is still a Discrete Logarithm (DL) problem after the decryption. In our protocol the plaintext space can be as large as bounded by the security parameter τ, and the intractability of DL problem is utilized to protect the private datasets. Based on the bilinear map, we also construct some eﬃcient non-interactive proofs. The security of our pr...

Related Content

Added |
28 May 2010 |

Updated |
28 May 2010 |

Type |
Conference |

Year |
2008 |

Where |
ACSC |

Authors |
Yingpeng Sang, Hong Shen |

Comments (0)