Title :
Private matching protocols without error probability
Author :
Liu, Lihua ; Cao, Zhengjun
Author_Institution :
Dept. of Math., Shanghai Maritime Univ., Shanghai, China
Abstract :
A private matching scheme is a two-party protocol between a client Alice and a server Bob. Alice holds a set X and Bob holds a set Y. At the conclusion of the protocol, Alice learns the intersection X ∩ Y (and nothing more), while Bob gains no information at all. Private matching is a special problem that is at the heart of numerous data processing tasks in a variety of applications. In this paper, we investigate some earlier private matching schemes and remark that they can only ensure that Alice learns X´ ∩ Y´, where X´ ∩ Y´ is approximately equal to X ∩ Y. We then present two private matching schemes in the model of semi-honest adversary. Due to the bijection used in these schemes, the resulting intersection X´ ∩ Y´ is strictly equal to X ∩ Y.
Keywords :
cryptographic protocols; client Alice; private matching protocols; semihonest adversary model; server Bob; two-party protocol; Encryption; Error probability; Force; Polynomials; Protocols; private matching; set intersection;
Conference_Titel :
Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-8727-1
DOI :
10.1109/CSAE.2011.5952869