Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication

Version 1 : Received: 25 April 2024 / Approved: 25 April 2024 / Online: 26 April 2024 (00:14:06 CEST)

How to cite: Tan, W.; Du, S.; Weng, J. Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Preprints 2024, 2024041701. https://doi.org/10.20944/preprints202404.1701.v1 Tan, W.; Du, S.; Weng, J. Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Preprints 2024, 2024041701. https://doi.org/10.20944/preprints202404.1701.v1

Abstract

Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data. Traditional approaches assume similar-sized datasets and equal computational power, overlooking practical imbalances. In real-world applications, dataset sizes and computational capacities often vary, particularly in the Internet of Things and mobile scenarios where device limitations restrict computational types. Traditional PSI protocols are inefficient here, as computational and communication complexities correlate with the size of larger datasets. Thus, adapting PSI protocols to these imbalances is crucial. This paper explores unbalanced PSI scenarios where one party (the receiver) has a relatively small dataset and limited computational power, while the other party (the sender) has a large amount of data and strong computational capabilities. It introduces three innovative solutions for unbalanced PSI: unbalanced PSI protocol based on Cuckoo filters, unbalanced PSI protocol based on single cloud assistance, and unbalanced PSI protocol based on dual cloud assistance, each addressing the shortcomings of the previous solution. These protocols primarily optimize database computational load, storage capacity, protocol execution time, and security. Depending on performance and security needs, different protocols can be employed for applications such as private contact discovery.

Keywords

Cryptographic; Private Set Intersection; Cuckoo Filter; Cloud Assistance; Private Contact Discovery)

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.