Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication

Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data. Traditional approaches assume similar-sized datasets and equal computational power, overlooking practica...

Full description

Saved in:
Bibliographic Details
Main Authors: Qian Feng, Shenglong Du, Wuzheng Tan, Jian Weng
Format: Article
Language:English
Published: MDPI AG 2024-09-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/15/9/554
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850260869281218560
author Qian Feng
Shenglong Du
Wuzheng Tan
Jian Weng
author_facet Qian Feng
Shenglong Du
Wuzheng Tan
Jian Weng
author_sort Qian Feng
collection DOAJ
description Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data. Traditional approaches assume similar-sized datasets and equal computational power, overlooking practical imbalances. In real-world applications, dataset sizes and computational capacities often vary, particularly in the Internet of Things and mobile scenarios where device limitations restrict computational types. Traditional PSI protocols are inefficient here, as computational and communication complexities correlate with the size of larger datasets. Thus, adapting PSI protocols to these imbalances is crucial. This paper explores unbalanced PSI scenarios where one party (the receiver) has a relatively small dataset and limited computational power, while the other party (the sender) has a large amount of data and strong computational capabilities. It introduces three innovative solutions for unbalanced PSI: an unbalanced PSI protocol based on the Cuckoo filter, an unbalanced PSI protocol based on single-cloud assistance, and an unbalanced PSI protocol based on dual-cloud assistance, with each subsequent solution addressing the shortcomings of the previous one. Depending on performance and security needs, different protocols can be employed for applications such as private contact discovery.
format Article
id doaj-art-586e23d1cd7242c39f003dbdd80fcc2a
institution OA Journals
issn 2078-2489
language English
publishDate 2024-09-01
publisher MDPI AG
record_format Article
series Information
spelling doaj-art-586e23d1cd7242c39f003dbdd80fcc2a2025-08-20T01:55:33ZengMDPI AGInformation2078-24892024-09-0115955410.3390/info15090554Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile CommunicationQian Feng0Shenglong Du1Wuzheng Tan2Jian Weng3College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Cyber Security, Jinan University, Guangzhou 510632, ChinaPrivate Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data. Traditional approaches assume similar-sized datasets and equal computational power, overlooking practical imbalances. In real-world applications, dataset sizes and computational capacities often vary, particularly in the Internet of Things and mobile scenarios where device limitations restrict computational types. Traditional PSI protocols are inefficient here, as computational and communication complexities correlate with the size of larger datasets. Thus, adapting PSI protocols to these imbalances is crucial. This paper explores unbalanced PSI scenarios where one party (the receiver) has a relatively small dataset and limited computational power, while the other party (the sender) has a large amount of data and strong computational capabilities. It introduces three innovative solutions for unbalanced PSI: an unbalanced PSI protocol based on the Cuckoo filter, an unbalanced PSI protocol based on single-cloud assistance, and an unbalanced PSI protocol based on dual-cloud assistance, with each subsequent solution addressing the shortcomings of the previous one. Depending on performance and security needs, different protocols can be employed for applications such as private contact discovery.https://www.mdpi.com/2078-2489/15/9/554multi-party computationprivate set intersectionCuckoo filtercloud assistanceprivate contact discovery
spellingShingle Qian Feng
Shenglong Du
Wuzheng Tan
Jian Weng
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
Information
multi-party computation
private set intersection
Cuckoo filter
cloud assistance
private contact discovery
title Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
title_full Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
title_fullStr Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
title_full_unstemmed Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
title_short Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
title_sort efficient cryptographic solutions for unbalanced private set intersection in mobile communication
topic multi-party computation
private set intersection
Cuckoo filter
cloud assistance
private contact discovery
url https://www.mdpi.com/2078-2489/15/9/554
work_keys_str_mv AT qianfeng efficientcryptographicsolutionsforunbalancedprivatesetintersectioninmobilecommunication
AT shenglongdu efficientcryptographicsolutionsforunbalancedprivatesetintersectioninmobilecommunication
AT wuzhengtan efficientcryptographicsolutionsforunbalancedprivatesetintersectioninmobilecommunication
AT jianweng efficientcryptographicsolutionsforunbalancedprivatesetintersectioninmobilecommunication