Laconic Private Set Intersection and Applications

Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations

    Abstract

    Consider a server with a large set S of strings { x1, x2…, xN} that would like to publish a small hash h of its set S such that any client with a string y can send the server a short message allowing it to learn y if y∈ S and nothing otherwise. In this work, we study this problem of two-round private set intersection (PSI) with low (asymptotically optimal) communication cost, or what we call laconic private set intersection (ℓ PSI) and its extensions. This problem is inspired by the recent general frameworks for laconic cryptography [Cho et al. CRYPTO 2017, Quach et al. FOCS’18]. We start by showing the first feasibility result for realizing ℓ PSI based on the CDH assumption, or LWE with polynomial noise-to-modulus ratio. However, these feasibility results use expensive non-black-box cryptographic techniques leading to significant inefficiency. Next, with the goal of avoiding these inefficient techniques, we give a construction of ℓ PSI schemes making only black-box use of cryptographic functions. Our construction is secure against semi-honest receivers, malicious senders and reusable in the sense that the receiver’s message can be reused across any number of executions of the protocol. The scheme is secure under the ϕ -hiding, decisional composite residuosity and subgroup decision assumptions. Finally, we show natural applications of ℓ PSI to realizing a semantically-secure encryption scheme that supports detection of encrypted messages belonging to a set of “illegal” messages (e.g., an illegal video) circulating online. Over the past few years, significant effort has gone into realizing laconic cryptographic protocols. Nonetheless, our work provides the first black-box constructions of such protocols for a natural application setting.

    Original languageEnglish (US)
    Title of host publicationTheory of Cryptography - 19th International Conference, TCC 2021, Proceedings
    EditorsKobbi Nissim, Brent Waters, Brent Waters
    PublisherSpringer Science and Business Media Deutschland GmbH
    Pages94-125
    Number of pages32
    ISBN (Print)9783030904555
    DOIs
    StatePublished - 2021
    Event19th International Conference on Theory of Cryptography, TCC 2021 - Raleigh, United States
    Duration: Nov 8 2021Nov 11 2021

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume13044 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference19th International Conference on Theory of Cryptography, TCC 2021
    Country/TerritoryUnited States
    CityRaleigh
    Period11/8/2111/11/21

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Computer Science(all)

    Fingerprint

    Dive into the research topics of 'Laconic Private Set Intersection and Applications'. Together they form a unique fingerprint.

    Cite this