Netinfo Security ›› 2020, Vol. 20 ›› Issue (1): 9-15.doi: 10.3969/j.issn.1671-1122.2020.01.002

Previous Articles     Next Articles

Protocol of Privacy-preserving Set Intersection Computation

TANG Chunming(), LIN Xuhui   

  1. School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China
  • Received:2019-07-15 Online:2020-01-10 Published:2020-05-11

Abstract:

Privacy-preserving set intersection computation is a special application problem in the field of secure multi-party computation, which has important research value and a wide range of application. In the era of rapid development of information, the study on this problem meets the needs of people for privacy protection while people enjoy various conveniences in daily life. This paper considers the privacy-preserving set intersection of two participants. First, the problem of solving the intersection of two sets is transformed into the problem of solving the greatest common factor of two polynomials by expressing sets as polynomials. Then, according to the mathematical properties of polynomials and Pailliar homomorphic encryption algorithm, a protocol of privacy-preserving two-party set intersection computation is designed, and the correctness and the security analyses of the protocol are given. Finally, through the comparison and analysis with the related literature, it is concluded that the computational complexity and communication complexity of the proposed protocol are relatively low, and the number of elements in the participant set can be well protected.

Key words: secure multi-party computation, privacy-preserving, set intersection, Pailliar homomorphic encryption algorithm

CLC Number: