Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks

IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Journal of Systems Architecture Pub Date : 2025-01-25 DOI:10.1016/j.sysarc.2025.103346
Zhuang Shan , Leyou Zhang , Qing Wu , Qiqi Lai , Fuchun Guo
{"title":"Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks","authors":"Zhuang Shan ,&nbsp;Leyou Zhang ,&nbsp;Qing Wu ,&nbsp;Qiqi Lai ,&nbsp;Fuchun Guo","doi":"10.1016/j.sysarc.2025.103346","DOIUrl":null,"url":null,"abstract":"<div><div>Mobile social networks have become integral to our daily lives, transforming communication methods and facilitating social interactions. With technological advancements, users generate vast amounts of valuable and sensitive personal data, which is stored on servers to enable instant information sharing. To protect the sharing data, each platform has implemented many techniques such as end-to-end encryption mechanisms, fully homomorphic encryption, etc. However, these approaches face several security and privacy challenges, including potential leaks of user data, vulnerabilities in encryption that expose privacy ciphertexts to probabilistic attacks, and threats posed by future quantum computers.</div><div>Aimed at the above, we introduce a private set intersection (PSI) protocol based on oblivious pseudorandom functions (OPRF) under ring LPR problem from lattice. The proposed perturbed pseudorandom generator not only enhances the PSI’s resistance to probabilistic attacks, but also leads to generate a more efficient OPRF and a PSI. It boasts a time complexity of <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>n</mi><mo>log</mo><mi>n</mi><mo>)</mo></mrow></mrow></math></span> and is superior to existing well-known fast post-quantum PSI protocol operating at <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>log</mo><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow><mo>)</mo></mrow></mrow></math></span>, where <span><math><mi>m</mi></math></span> is the bit length of the cryptographic modulus and <span><math><mi>n</mi></math></span> represents the dimension of the security parameter. Simulation experiments and security analyses demonstrate that our proposal effectively preserves user privacy, ensures collusion resilience, verifies computation results, and maintains low computational costs. Finally, as an expansion of our OPRF, we also give a fast private information retrieval (PIR) protocol.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"160 ","pages":"Article 103346"},"PeriodicalIF":4.1000,"publicationDate":"2025-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Systems Architecture","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1383762125000189","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Mobile social networks have become integral to our daily lives, transforming communication methods and facilitating social interactions. With technological advancements, users generate vast amounts of valuable and sensitive personal data, which is stored on servers to enable instant information sharing. To protect the sharing data, each platform has implemented many techniques such as end-to-end encryption mechanisms, fully homomorphic encryption, etc. However, these approaches face several security and privacy challenges, including potential leaks of user data, vulnerabilities in encryption that expose privacy ciphertexts to probabilistic attacks, and threats posed by future quantum computers.
Aimed at the above, we introduce a private set intersection (PSI) protocol based on oblivious pseudorandom functions (OPRF) under ring LPR problem from lattice. The proposed perturbed pseudorandom generator not only enhances the PSI’s resistance to probabilistic attacks, but also leads to generate a more efficient OPRF and a PSI. It boasts a time complexity of O(nlogn) and is superior to existing well-known fast post-quantum PSI protocol operating at O(mnlog(mn)), where m is the bit length of the cryptographic modulus and n represents the dimension of the security parameter. Simulation experiments and security analyses demonstrate that our proposal effectively preserves user privacy, ensures collusion resilience, verifies computation results, and maintains low computational costs. Finally, as an expansion of our OPRF, we also give a fast private information retrieval (PIR) protocol.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于遗忘伪随机函数的移动社交网络快速后量子私有集交集
移动社交网络已经成为我们日常生活中不可或缺的一部分,它改变了我们的沟通方式,促进了社会互动。随着科技的进步,用户产生了大量有价值和敏感的个人数据,这些数据存储在服务器上,以便即时共享信息。为了保护共享数据,各个平台实现了端到端加密机制、全同态加密等技术。然而,这些方法面临着一些安全和隐私方面的挑战,包括用户数据的潜在泄露,加密中的漏洞使隐私密文暴露于概率攻击,以及未来量子计算机带来的威胁。针对上述问题,在格域环LPR问题下,我们引入了一种基于遗忘伪随机函数的私有集交(PSI)协议。所提出的摄动伪随机发生器不仅增强了PSI对概率攻击的抵抗能力,而且可以生成更高效的OPRF和PSI。它的时间复杂度为0 (nlogn),优于现有众所周知的运行速度为0 (mnlog(mn))的快速后量子PSI协议,其中m为密码模的位长度,n为安全参数的维数。仿真实验和安全性分析表明,该方案有效地保护了用户隐私,保证了合谋弹性,验证了计算结果,并保持了较低的计算成本。最后,作为OPRF的扩展,给出了一个快速私有信息检索(PIR)协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Systems Architecture
Journal of Systems Architecture 工程技术-计算机:硬件
CiteScore
8.70
自引率
15.60%
发文量
226
审稿时长
46 days
期刊介绍: The Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, FPGA programming, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software. Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While hardware is not a part of this journal hardware/software co-design methods that consider interplay between software and hardware components with and emphasis on software are also relevant here.
期刊最新文献
Flexible Model Inversion Attack with soft biometric attribute reconstruction against face classifiers A two-layer system architecture for Unmanned Aerial Vehicle (UAV)-assisted offloading: Game-theoretic allocation and CTDE-MADDPG control Fine-grained sensitive node hardening for graph convolutional network systems An architecture-adaptive optimization strategy for high-performance SYMV on a heterogeneous AI accelerator ZJC: Constructing fully local repair in erasure codes for distributed cloud storage
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1