Efficient Set Operations in the Presence of Malicious Adversaries

  • Authors:
  • Carmit Hazay;Kobbi Nissim

  • Affiliations:
  • Århus University, Dept. of Computer Science, Århus, Denmark;Microsoft AI, Herzliya, Israel and Ben-Gurion University of the Negev, Dept. of Computer Science, Beer Sheva, Israel

  • Venue:
  • Journal of Cryptology
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We revisit the problem of constructing efficient secure two-party protocols for the problems of set intersection and set union, focusing on the model of malicious parties. Our main results are constant-round protocols that exhibit linear communication and a (practically) linear number of exponentiations with simulation-based security. At the heart of these constructions is a technique based on a combination of a perfectly hiding commitment and an oblivious pseudorandom function evaluation protocol. Our protocols readily transform into protocols that are UC secure, and we discuss how to perform these transformations.