Fair private set intersection with a semi-trusted arbiter

Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

20 Citations (Scopus)
85 Downloads (Pure)

Abstract

A private set intersection (PSI) protocol allows two parties to compute the intersection of their input sets privately. Most of the previous PSI protocols only output the result to one party and the other party gets nothing from running the protocols. However, a mutual PSI protocol in which both parties can get the output is highly desirable in many applications. A major obstacle in designing a mutual PSI protocol is how to ensure fairness. In this paper we present the first fair mutual PSI protocol which is efficient and secure. Fairness of the protocol is obtained in an optimistic fashion, i.e. by using an offline third party arbiter. In contrast to many optimistic protocols which require a fully trusted arbiter, in our protocol the arbiter is only required to be semi-trusted, in the sense that we consider it to be a potential threat to both parties' privacy but believe it will follow the protocol. The arbiter can resolve disputes without knowing any private information belongs to the two parties. This feature is appealing for a PSI protocol in which privacy may be of ultimate importance.
Original languageEnglish
Title of host publicationData and Applications Security and Privacy XXVII
Subtitle of host publication27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
EditorsLingyu Wang, Basit Shafiq
PublisherSpringer
Pages128-144
Number of pages17
Volume7964
DOIs
Publication statusPublished - 2013

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume7964
ISSN (Print)0302-9743

Keywords

  • data encryption
  • communication networks
  • private set intersection

Cite this

Dong, C., Chen, L., Camenisch, J., & Russello, G. (2013). Fair private set intersection with a semi-trusted arbiter. In L. Wang, & B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings (Vol. 7964, pp. 128-144). (Lecture Notes in Computer Science; Vol. 7964). Springer. https://doi.org/10.1007/978-3-642-39256-6_9