Efficient set operations in the presence of malicious adversaries

  • Authors:
  • Carmit Hazay;Kobbi Nissim

  • Affiliations:
  • Dept. of Computer Science and Applied Mathematics, Weizmann Institute and Interdisciplinary Center (IDC), Herzliya;Dept. of Computer Science, Ben-Gurion University and Microsoft AI, Israel

  • Venue:
  • PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We revisit the problem of constructing efficient secure two-party protocols for set-intersection and set-union, focusing on the model of malicious parties. Our main results are constant-round protocols that exhibit linear communication and a linear number of exponentiations with simulation based security. In the heart of these constructions is a technique based on a combination of a perfectly hiding commitment and an oblivious pseudorandom function evaluation protocol. Our protocols readily transform into protocols that are UC-secure.