{"title":"可验证私等式检验:在恶意模型的有序集上启用无偏2方调和","authors":"D. Mayer, S. Wetzel","doi":"10.1145/2414456.2414482","DOIUrl":null,"url":null,"abstract":"In this paper we introduce the novel notion called Verifiable Private Equality Test (VPET) and propose an efficient 2-party protocol for its implementation. VPET enables two parties to securely perform an arbitrary number of comparisons on a fixed collection of (key, value) pairs and thus it is more generic than existing techniques such as Private Equality Test and Private Set Intersection.\n In addition, we demonstrate how higher-level protocols such as Privacy-Preserving Reconciliation on Ordered Sets (PROS) can be implemented using VPET.\n Using simulation-based techniques, our new protocols are proven secure in the malicious model. Furthermore, we present a theoretical complexity analysis as well as a thorough experimental performance evaluation of the C++ implementation of our new VPET and PROS protocols.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model\",\"authors\":\"D. Mayer, S. Wetzel\",\"doi\":\"10.1145/2414456.2414482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we introduce the novel notion called Verifiable Private Equality Test (VPET) and propose an efficient 2-party protocol for its implementation. VPET enables two parties to securely perform an arbitrary number of comparisons on a fixed collection of (key, value) pairs and thus it is more generic than existing techniques such as Private Equality Test and Private Set Intersection.\\n In addition, we demonstrate how higher-level protocols such as Privacy-Preserving Reconciliation on Ordered Sets (PROS) can be implemented using VPET.\\n Using simulation-based techniques, our new protocols are proven secure in the malicious model. Furthermore, we present a theoretical complexity analysis as well as a thorough experimental performance evaluation of the C++ implementation of our new VPET and PROS protocols.\",\"PeriodicalId\":72308,\"journal\":{\"name\":\"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2414456.2414482\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2414456.2414482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model
In this paper we introduce the novel notion called Verifiable Private Equality Test (VPET) and propose an efficient 2-party protocol for its implementation. VPET enables two parties to securely perform an arbitrary number of comparisons on a fixed collection of (key, value) pairs and thus it is more generic than existing techniques such as Private Equality Test and Private Set Intersection.
In addition, we demonstrate how higher-level protocols such as Privacy-Preserving Reconciliation on Ordered Sets (PROS) can be implemented using VPET.
Using simulation-based techniques, our new protocols are proven secure in the malicious model. Furthermore, we present a theoretical complexity analysis as well as a thorough experimental performance evaluation of the C++ implementation of our new VPET and PROS protocols.