期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
EMPSI:Efficient multiparty private set intersection(with cardinality)
1
作者 Yunbo YANG Xiaolei DONG +4 位作者 Zhenfu CAO Jiachen SHEN Ruofan LI Yihao YANG Shangmin DOU 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期199-213,共15页
Multiparty private set intersection(PSI)allows several parties,each holding a set of elements,to jointly compute the intersection without leaking any additional information.With the development of cloud computing,PSI ... Multiparty private set intersection(PSI)allows several parties,each holding a set of elements,to jointly compute the intersection without leaking any additional information.With the development of cloud computing,PSI has a wide range of applications in privacy protection.However,it is complex to build an efficient and reliable scheme to protect user privacy.To address this issue,we propose EMPSI,an efficient PSI(with cardinality)protocol in a multiparty setting.EMPSI avoids using heavy cryptographic primitives(mainly rely on symmetric-key encryption)to achieve better performance.In addition,both PSI and PSI with the cardinality of EMPSI are secure against semi-honest adversaries and allow any number of colluding clients(at least one honest client).We also do experiments to compare EMPSI with some state-of-the-art works.The experimental results show that proposed EMPSI(-CA)has better performance and is scalable in the number of clients and the set size. 展开更多
关键词 INTERSECTION cardinal PRIMITIVE
原文传递
IXT: Improved searchable encryption for multi-word queries based on PSI 被引量:1
2
作者 Yunbo YANG Xiaolei DONG +2 位作者 Zhenfu CAO Jiachen SHEN Shangmin DOU 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期153-163,共11页
Oblivious Cross-Tags(OXT)[1]is the first efficient searchable encryption(SE)protocol for conjunctive queries in a single-writer single-reader framework.However,it also has a trade-off between security and efficiency b... Oblivious Cross-Tags(OXT)[1]is the first efficient searchable encryption(SE)protocol for conjunctive queries in a single-writer single-reader framework.However,it also has a trade-off between security and efficiency by leaking partial database information to the server.Recent attacks on these SE schemes show that the leakages from these SE schemes can be used to recover the content of queried keywords.To solve this problem,Lai et al.[2]propose Hidden Cross-Tags(HXT),which reduces the access pattern leakage from Keyword Pair Result Pattern(KPRP)to Whole Result Pattern(WRP).However,the WRP leakage can also be used to recover some additional contents of queried keywords.This paper proposes Improved Cross-Tags(IXT),an efficient searchable encryption protocol that achieves access and searches pattern hiding based on the labeled private set intersection.We also prove the proposed labeled private set intersection(PSI)protocol is secure against semi-honest adversaries,and IXT is-semi-honest secure(is leakage function).Finally,we do experiments to compare IXT with HXT.The experimental results show that the storage overhead and computation overhead of the search phase at the client-side in IXT is much lower than those in HXT.Meanwhile,the experimental results also show that IXT is scalable and can be applied to various sizes of datasets. 展开更多
关键词 searchable encryption private set intersection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部