About author:ZHANG Jing, born in 1978, Ph. D., associate professor. Her research interests include cryptography and information security, secure multi-party computation. TIAN He, born in 1997, M. S. candidate. His research interests include cryptography and information security, privacy set intersection computation. XIONG Kun, born in 1999, M. S. candidate. His research interests include cryptography and information security, secure multi-party computation. YANG Li, born in 1998, M. S. candidate. Her research interests include cryptography and information security, privacy set intersection computation.
Supported by:
Henan Polytechnic University of Technology Doctoral Fund(B2021-41);Research Project of Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11)
Jing ZHANG, He TIAN, Kun XIONG, Yongli TANG, Li YANG. Fair multi-party private set intersection protocol based on cloud server[J]. Journal of Computer Applications, 2023, 43(9): 2806-2811.
SHEN L Y, CHEN X J, SHI J Q, et al. Survey on privation set intersection technology[J]. Journal of Computer Research and Development,2017, 54(10):2153-2169. 10.7544/issn1000-1239.2017.20170461
WEI L F, LIU J H, ZHANG L, et al. Survey of privacy preserving oriented set intersection computation[J]. Journal of Computer Research and Development2022, 59(8):1782-1799. 10.7544/issn1000-1239.20210685
3
LV S Y, YE J H, YIN S J, et al. Unbalanced private set intersection cardinality protocol with low communication cost[J]. Future Generation Computer Systems, 2020, 102: 1054-1061. 10.1016/j.future.2019.09.022
4
LI M, YU S C, CAO N, et al. Privacy-preserving distributed profile matching in proximity based mobile social networks[J]. IEEE Transactions on Wireless Communications, 2013, 12(5): 2024-2033. 10.1109/twc.2013.032513.120149
WEI L F, WANG Q, ZHANG L, et al. Efficient private set intersection protocols with semi-trusted cloud server aided[J]. Journal of Software, 2023, 34(2):932-944.
7
SHEN L Y, CHEN X J, WANG D K, et al. Efficient and private set intersection of human genomes[C]// Proceedings of the 2018 IEEE International Conference on Bioinformatics and Biomedicine. Piscataway: IEEE, 2018: 761-764. 10.1109/bibm.2018.8621291
8
INBAR R, OMRI E, PINKAS B. Efficient scalable multiparty private set-intersection via garbled bloom filters[C]// Proceedings of the 2018 International Conference on Security and Cryptography for Networks, LNCS 11035. Cham: Springer, 2018: 235-252.
9
KAVOUSI A, MOHAJERI J, SALMASIZADEH M. Efficient scalable multi-party private set intersection using oblivious PRF[C]// Proceedings of the 2021 International Workshop on Security and Trust Management, LNCS 13075. Cham: Springer, 2021: 81-99.
10
BEN-EFRAIM A, NISSENBAUM O, OMRI E, et al. PSImple: practical multiparty maliciously-secure private set intersection[C]// Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security. New York: ACM, 2022: 1098-1112. 10.1145/3488932.3523254
11
DEBNATH S K, SAKURAI K, DEY K, et al. Secure outsourced private set intersection with linear complexity[C]// Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing. Piscataway: IEEE, 2021: 1-8. 10.1109/dsc49826.2021.9346230
12
KANO H, HAKUTA K. Efficiency improvement techniques for private intersection-sum protocol using Bloom filter[J]. SN Applied Sciences, 2022, 4(2): No.37. 10.1007/s42452-021-04910-z
13
DEBNATH S K, DUTTA R. Towards fair mutual private set intersection with linear complexity[J]. Security and Communication Networks, 2016, 9(11): 1589-1612. 10.1002/sec.1450
14
DEBNATH S K, DUTTA R. New realizations of efficient and secure private set intersection protocols preserving fairness[C]// Proceedings of the 2016 International Conference on Information Security and Cryptology, LNCS 10157. Cham: Springer, 2017: 254-284.
15
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613. 10.1145/359168.359176
16
DONG C Y, CHEN L Q, WEN Z K. When private set intersection meets big data: an efficient and scalable protocol[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2013: 789-800. 10.1145/2508859.2516701
17
WANG D, WANG P. Two birds with one stone: two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(4): 708-722.